About Cabling Installation & Maintenance

Our mission: Bringing practical business and technical intelligence to today's structured cabling professionals

For more than 30 years, Cabling Installation & Maintenance has provided useful, practical information to professionals responsible for the specification, design, installation and management of structured cabling systems serving enterprise, data center and other environments. These professionals are challenged to stay informed of constantly evolving standards, system-design and installation approaches, product and system capabilities, technologies, as well as applications that rely on high-performance structured cabling systems. Our editors synthesize these complex issues into multiple information products. This portfolio of information products provides concrete detail that improves the efficiency of day-to-day operations, and equips cabling professionals with the perspective that enables strategic planning for networks’ optimum long-term performance.

Throughout our annual magazine, weekly email newsletters and 24/7/365 website, Cabling Installation & Maintenance digs into the essential topics our audience focuses on.

  • Design, Installation and Testing: We explain the bottom-up design of cabling systems, from case histories of actual projects to solutions for specific problems or aspects of the design process. We also look at specific installations using a case-history approach to highlight challenging problems, solutions and unique features. Additionally, we examine evolving test-and-measurement technologies and techniques designed to address the standards-governed and practical-use performance requirements of cabling systems.
  • Technology: We evaluate product innovations and technology trends as they impact a particular product class through interviews with manufacturers, installers and users, as well as contributed articles from subject-matter experts.
  • Data Center: Cabling Installation & Maintenance takes an in-depth look at design and installation workmanship issues as well as the unique technology being deployed specifically for data centers.
  • Physical Security: Focusing on the areas in which security and IT—and the infrastructure for both—interlock and overlap, we pay specific attention to Internet Protocol’s influence over the development of security applications.
  • Standards: Tracking the activities of North American and international standards-making organizations, we provide updates on specifications that are in-progress, looking forward to how they will affect cabling-system design and installation. We also produce articles explaining the practical aspects of designing and installing cabling systems in accordance with the specifications of established standards.

Cabling Installation & Maintenance is published by Endeavor Business Media, a division of EndeavorB2B.

Contact Cabling Installation & Maintenance

Editorial

Patrick McLaughlin

Serena Aburahma

Advertising and Sponsorship Sales

Peter Fretty - Vice President, Market Leader

Tim Carli - Business Development Manager

Brayden Hudspeth - Sales Development Representative

Subscriptions and Memberships

Subscribe to our newsletters and manage your subscriptions

Feedback/Problems

Send a message to our general in-box

 

Working remotely? What to know about cybersecurity

(BPT) - If you are employed in the US, it's more likely than not that you worked remotely this past year.

52% of Americans have done part or all of their jobs from home during the pandemic. That's even more than the number of Americans with a college degree.

Over time, we've perfected some aspects of remote and hybrid working - from comfortable chairs to Zoom happy hours.

But there's one thing that remains a major problem for most people: cybersecurity.

A homegrown problem

Work-from-home arrangements have contributed to a 238% increase in global cyberattack volume during the pandemic. And the attacks haven't simply grown in amount - they're more costly, too. The average cost of a data breach rose by 10% to a staggering $4.24 million.

Why? Because employees aren't following cyber standards and best practices. For instance, the vast majority of employees are using work devices for personal tasks and personal devices for work. Some of you might even be thinking, 'What's wrong with that?'

Now, more than ever, we all need to take cybersecurity seriously. 'Cybersecurity is a top priority because our clients entrust us with their sensitive information and personal finances,' says Bashar Abouseido, Managing Director and Chief Information Security Officer at Charles Schwab. 'We make it everyone's business. We train every employee on best practices so that our clients can rest assured that their money, investments and financial futures are safe.'

Cybersecurity is everyone's business

You might be thinking, 'Another lecture about compliance? Did my IT department pay you to write this?' But everyone has a stake in cybersecurity.

  • It impacts the employer. Businesses can lose more than money - their reputation, customers and even ability to stay open are at stake. In fact, 60% of small and midsized businesses that are hacked go out of business within six months.
  • It impacts the employee. Not only can hackers unlawfully access company data through employees, but personal data can also be compromised. From social media accounts to personal finances, sensitive information becomes vulnerable without proper safeguards in place.
  • It impacts the client. It takes a lot of trust to put your own data in someone else's hands. Sometimes, the stakes are incredibly high. Financial services companies, for instance, are entrusted with everything from employment information and income to Social Security numbers and retirement savings.

What's next?

Here are four ways remote employees can protect themselves, their clients and the companies they work for:

  1. Don't mix business and personal devices: Using personal devices for work-related activities can easily put company data at risk if there is a breach. And that goes both ways: If the company is hacked, personal data may also be stolen.
  2. Avoid public Wi-Fi: It's great when you don't need a password to connect to the internet at your local coffeeshop or airport, right? Hackers agree! Public Wi-Fi networks are inherently insecure, and that means it's best to avoid them if at all possible.
  3. Get a virtual private network (VPN): These networks provide encrypted connections, ensuring that sensitive information is safely transmitted.
  4. Use multi-factor authentication (MFA): When transmitting sensitive information over the internet, look for websites that ask you to verify your identity by receiving an email, text or call. Microsoft recently found that MFA prevents an astonishing 99.9% of all cyberattacks.

Visit https://www.aboutschwab.com/cybersecurity to learn more about cybersecurity and how to keep yourself safe.

Stock Quote API & Stock News API supplied by www.cloudquote.io
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the following
Privacy Policy and Terms Of Service.