About Cabling Installation & Maintenance

Our mission: Bringing practical business and technical intelligence to today's structured cabling professionals

For more than 30 years, Cabling Installation & Maintenance has provided useful, practical information to professionals responsible for the specification, design, installation and management of structured cabling systems serving enterprise, data center and other environments. These professionals are challenged to stay informed of constantly evolving standards, system-design and installation approaches, product and system capabilities, technologies, as well as applications that rely on high-performance structured cabling systems. Our editors synthesize these complex issues into multiple information products. This portfolio of information products provides concrete detail that improves the efficiency of day-to-day operations, and equips cabling professionals with the perspective that enables strategic planning for networks’ optimum long-term performance.

Throughout our annual magazine, weekly email newsletters and 24/7/365 website, Cabling Installation & Maintenance digs into the essential topics our audience focuses on.

  • Design, Installation and Testing: We explain the bottom-up design of cabling systems, from case histories of actual projects to solutions for specific problems or aspects of the design process. We also look at specific installations using a case-history approach to highlight challenging problems, solutions and unique features. Additionally, we examine evolving test-and-measurement technologies and techniques designed to address the standards-governed and practical-use performance requirements of cabling systems.
  • Technology: We evaluate product innovations and technology trends as they impact a particular product class through interviews with manufacturers, installers and users, as well as contributed articles from subject-matter experts.
  • Data Center: Cabling Installation & Maintenance takes an in-depth look at design and installation workmanship issues as well as the unique technology being deployed specifically for data centers.
  • Physical Security: Focusing on the areas in which security and IT—and the infrastructure for both—interlock and overlap, we pay specific attention to Internet Protocol’s influence over the development of security applications.
  • Standards: Tracking the activities of North American and international standards-making organizations, we provide updates on specifications that are in-progress, looking forward to how they will affect cabling-system design and installation. We also produce articles explaining the practical aspects of designing and installing cabling systems in accordance with the specifications of established standards.

Cabling Installation & Maintenance is published by Endeavor Business Media, a division of EndeavorB2B.

Contact Cabling Installation & Maintenance

Editorial

Patrick McLaughlin

Serena Aburahma

Advertising and Sponsorship Sales

Peter Fretty - Vice President, Market Leader

Tim Carli - Business Development Manager

Brayden Hudspeth - Sales Development Representative

Subscriptions and Memberships

Subscribe to our newsletters and manage your subscriptions

Feedback/Problems

Send a message to our general in-box

 

What the hack: 3 tips to keep you safe online

(BPT) - Your digital accounts and online activities may make your life easier and perhaps even more enjoyable, but did you know every time you log in, it's a chance for cybercriminals to hack your information and exploit it in numerous ways?

Hacking threats are constant. According to research from the University of Maryland, cyber attacks happen every 39 seconds on average. What's more, hackers get more sophisticated every day. The good news is, there are steps you can take to greatly lower your chances of becoming a cybercrime victim.

1. Authorize multi-factor authentication

Multi-factor authentication (commonly known as MFA) is one of the best steps you can take to secure your accounts. And the good news is it's already offered on many of your favorite applications and services today. MFA acts as an additional step to protect your accounts in addition to your username and password.

For example, if you sign into an account with two-factor authentication, the system may request you enter a one-time code sent to the phone number you have on file. You'll confirm your identity by typing the number that was texted in the sign-on request. Often these codes are only activated for a short period of time for added protection.

2. Adopt physical authentication

Not all multi-factor authentication is created equal, and SMS or mobile authentication has been proven to be vulnerable to phishing. The modern and most effective approach to keeping you and your data protected is using phishing-resistant multi-factor authentication solutions such as a hardware security key. YubiKeys are small physical keys you tap on your phone or plug into your computer's USB port to verify it's you. Essentially, they're like a key to your online accounts, similar to a house key or car key.

A single YubiKey has multiple functions for securing your login to email, online services, apps and computers. Because it's something you carry with you, it's far more secure than digital alternatives - so much so that there have been zero reported account takeovers. The YubiKey is used by thousands of businesses and is also available for individuals so you can add a higher level of online protection for yourself and your loved ones.

3. Use a password manager

Every password you use should be complex, with a mix of different letters, numbers and symbols. A password manager can create a unique, random password for each of your accounts. Better yet, it stores your passwords in an encrypted database to keep them safe while helping to ensure that you, and only you, will be able to access them easily when going online. And when you update your passwords - which you should do regularly - they are updated in the manager as well.

Additionally, don't forget to protect your password manager with MFA. Pairing your hardware security key with it will give you the ultimate protection. That way, if someone gets your master password for your password manager, they won't be able to log in without physically having your security key, too.

Finally, for your accounts or favorite sites that don't offer MFA, reach out to them and encourage them to provide you the tools you need to protect yourself.

Stock Quote API & Stock News API supplied by www.cloudquote.io
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the following
Privacy Policy and Terms Of Service.