{% set baseFontFamily = "Open Sans" %} /* Add the font family you wish to use. You may need to import it above. */

{% set headerFontFamily = "Open Sans" %} /* This affects only headers on the site. Add the font family you wish to use. You may need to import it above. */

{% set textColor = "#565656" %} /* This sets the universal color of dark text on the site */

{% set pageCenter = "1100px" %} /* This sets the width of the website */

{% set headerType = "fixed" %} /* To make this a fixed header, change the value to "fixed" - otherwise, set it to "static" */

{% set lightGreyColor = "#f7f7f7" %} /* This affects all grey background sections */

{% set baseFontWeight = "normal" %} /* More than likely, you will use one of these values (higher = bolder): 300, 400, 700, 900 */

{% set headerFontWeight = "normal" %} /* For Headers; More than likely, you will use one of these values (higher = bolder): 300, 400, 700, 900 */

{% set buttonRadius = '40px' %} /* "0" for square edges, "10px" for rounded edges, "40px" for pill shape; This will change all buttons */

After you have updated your stylesheet, make sure you turn this module off

Job One: Keep Network Equipment Secure

by Carl Weinschenk on August 25, 2015

Network EquipmentSecurity probably is the single most important recurring issue for any IT department. From end to end, the absolute necessity is to keep network equipment safe and protected.  Even vital functions such as monetization and providing services needed by the organization come in second to protecting the integrity of data and applications.

Short on time? Download our free Planning & Development Guide for WiFi Networks.

Meraki Switch The need for security is even more pronounced when the network equipment that is being protected is serving utilities that would cause widespread problems if taken off line or, worse yet, can be taken over by hackers to do harm. It is one thing to lose Internet service. It’s another to not be able to control a nuclear reactor.

Daily Dot reporter Patrick Howell O’Neill offers a long and pretty frightening story about a study of Industrial Ethernet Switches that is set for release at this week’s Black Hat conference in Las Vegas. The study – which was conducted a security researcher (who is an active member of the U.S. Air Force; the story doesn’t say if he is participating as a member of the military), IOActive, Siemens, General Electric, Opengear and Garrettcom – points to serious problems at many places where nobody wants there to be serious problems. Writes O’Neill:

The vulnerabilities on industrial switches covered in the new research include the widespread use of default passwords, hard-coded encryption keys, and a lack of proper authentication for firmware updates. These three fundamental failures of security combine to make it easier for attackers to gain access to industry devices and networks, change what they please, and take control.

The story also referred to backdoors into vital systems. The bottom line is clear: Network equipment must be intensely protected in general. It is particularly important to buy the right security hardware and software to keep industrial networks secure. In many cases, this is upgraded and customized versions of regular commercial gear. In others, it is specialized and unique network equipment.

used vs refurbished

Topics: Switches, Firewalls

Explore Our Full Cisco Line Up
VIEW MORE ABOUT CISCO
cisco devices-2