About Cabling Installation & Maintenance

Our mission: Bringing practical business and technical intelligence to today's structured cabling professionals

For more than 30 years, Cabling Installation & Maintenance has provided useful, practical information to professionals responsible for the specification, design, installation and management of structured cabling systems serving enterprise, data center and other environments. These professionals are challenged to stay informed of constantly evolving standards, system-design and installation approaches, product and system capabilities, technologies, as well as applications that rely on high-performance structured cabling systems. Our editors synthesize these complex issues into multiple information products. This portfolio of information products provides concrete detail that improves the efficiency of day-to-day operations, and equips cabling professionals with the perspective that enables strategic planning for networks’ optimum long-term performance.

Throughout our annual magazine, weekly email newsletters and 24/7/365 website, Cabling Installation & Maintenance digs into the essential topics our audience focuses on.

  • Design, Installation and Testing: We explain the bottom-up design of cabling systems, from case histories of actual projects to solutions for specific problems or aspects of the design process. We also look at specific installations using a case-history approach to highlight challenging problems, solutions and unique features. Additionally, we examine evolving test-and-measurement technologies and techniques designed to address the standards-governed and practical-use performance requirements of cabling systems.
  • Technology: We evaluate product innovations and technology trends as they impact a particular product class through interviews with manufacturers, installers and users, as well as contributed articles from subject-matter experts.
  • Data Center: Cabling Installation & Maintenance takes an in-depth look at design and installation workmanship issues as well as the unique technology being deployed specifically for data centers.
  • Physical Security: Focusing on the areas in which security and IT—and the infrastructure for both—interlock and overlap, we pay specific attention to Internet Protocol’s influence over the development of security applications.
  • Standards: Tracking the activities of North American and international standards-making organizations, we provide updates on specifications that are in-progress, looking forward to how they will affect cabling-system design and installation. We also produce articles explaining the practical aspects of designing and installing cabling systems in accordance with the specifications of established standards.

Cabling Installation & Maintenance is published by Endeavor Business Media, a division of EndeavorB2B.

Contact Cabling Installation & Maintenance

Editorial

Patrick McLaughlin

Serena Aburahma

Advertising and Sponsorship Sales

Peter Fretty - Vice President, Market Leader

Tim Carli - Business Development Manager

Brayden Hudspeth - Sales Development Representative

Subscriptions and Memberships

Subscribe to our newsletters and manage your subscriptions

Feedback/Problems

Send a message to our general in-box

 

Malicious Emails in a Time of War – How Cyber Attackers are Exploiting the War in Ukraine

Malicious actors have historically taken advantage of global events for their gain. The war in Ukraine is no different. Cybercriminals have been using spam emails that leverage crises to lure targets into opening messages containing malware attacks, phishing schemes, and cryptocurrency scams, to name a few.

In the past, digital thieves have engineered their attacks around social events like Covid-19, the Olympics, natural disasters, etc. So, it’s not shocking that the current war between Russia and Ukraine is also being used in a global digital war.

Reeling in the Phish During War

Since the media keeps the public informed on the happenings of the war, people feel the human need to help in any way they can. From far away, that means donating to an involved cause. Unfortunately, scammers have noticed this beautiful human undertaking and use people’s kindness against them.

Cybercriminals are sending fraudulent emails asking for donations in cryptocurrency, claiming that it is the only way they can accept financial assistance.

In this way, these criminals play with people’s emotions and use fake heart-wrenching cries for help to steal.

Malicious Emails in a Time of War

In addition to scam emails, bad actors also send spam messages containing malware. One of the main reported pretexts for these messages is an urgent notice that business transactions will be canceled or postponed due to the war in Ukraine.

For example, emails showing a delayed shipment direct you to click a link for more information. These malicious links exploit your system and can give the attacker complete control.

Apparent Money Bag Scheme

Cybercriminals are also sending fraudulent messages offering once-in-a-lifetime investment opportunities. The spam messages offer their targets a false promise of an inheritance or investment to manipulate them into sending money or bank information. This is very much like the classic “Nigerian Prince” scam that most people already know about, but when there is a current crisis, you may not expect such a scam to be circulating.

Finding signs that these emails are scams is straightforward, but you have to know what to look for. For example, if the email claims to be coming from a company in Ukraine, but a quick search shows it’s not based in Ukraine – odds are it’s a scam.

Another basic tactic criminals use is email spoofing. The scammer creates a variation of a valid sender’s address because people are more likely to engage with the email if the sender appears legitimate. Be sure to check the sender’s address carefully to confirm their authenticity.

Using Encrypted Email Services for Scam Filtering

Encrypted email providers do more than code your messages.

Research shows that 14.5 billion spam emails are sent every single day, allowing scammers to exploit their targets for a daily average of $7,000.

An effective encrypted email service provider will offer a top-of-the-line spam filter to protect email users from threats. In addition, these providers have the potential to block the spread of viruses, phishing attacks, and automate the separation of emails that are safe to open from the ones that are dangerous for your system.

Contact Information:

Name: Michael Bertini
Email: michael.bertini@iquanti.com
Job Title: Consultant

Stock Quote API & Stock News API supplied by www.cloudquote.io
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the following
Privacy Policy and Terms Of Service.