About Cabling Installation & Maintenance

Our mission: Bringing practical business and technical intelligence to today's structured cabling professionals

For more than 30 years, Cabling Installation & Maintenance has provided useful, practical information to professionals responsible for the specification, design, installation and management of structured cabling systems serving enterprise, data center and other environments. These professionals are challenged to stay informed of constantly evolving standards, system-design and installation approaches, product and system capabilities, technologies, as well as applications that rely on high-performance structured cabling systems. Our editors synthesize these complex issues into multiple information products. This portfolio of information products provides concrete detail that improves the efficiency of day-to-day operations, and equips cabling professionals with the perspective that enables strategic planning for networks’ optimum long-term performance.

Throughout our annual magazine, weekly email newsletters and 24/7/365 website, Cabling Installation & Maintenance digs into the essential topics our audience focuses on.

  • Design, Installation and Testing: We explain the bottom-up design of cabling systems, from case histories of actual projects to solutions for specific problems or aspects of the design process. We also look at specific installations using a case-history approach to highlight challenging problems, solutions and unique features. Additionally, we examine evolving test-and-measurement technologies and techniques designed to address the standards-governed and practical-use performance requirements of cabling systems.
  • Technology: We evaluate product innovations and technology trends as they impact a particular product class through interviews with manufacturers, installers and users, as well as contributed articles from subject-matter experts.
  • Data Center: Cabling Installation & Maintenance takes an in-depth look at design and installation workmanship issues as well as the unique technology being deployed specifically for data centers.
  • Physical Security: Focusing on the areas in which security and IT—and the infrastructure for both—interlock and overlap, we pay specific attention to Internet Protocol’s influence over the development of security applications.
  • Standards: Tracking the activities of North American and international standards-making organizations, we provide updates on specifications that are in-progress, looking forward to how they will affect cabling-system design and installation. We also produce articles explaining the practical aspects of designing and installing cabling systems in accordance with the specifications of established standards.

Cabling Installation & Maintenance is published by Endeavor Business Media, a division of EndeavorB2B.

Contact Cabling Installation & Maintenance

Editorial

Patrick McLaughlin

Serena Aburahma

Advertising and Sponsorship Sales

Peter Fretty - Vice President, Market Leader

Tim Carli - Business Development Manager

Brayden Hudspeth - Sales Development Representative

Subscriptions and Memberships

Subscribe to our newsletters and manage your subscriptions

Feedback/Problems

Send a message to our general in-box

 

Mimecast: Why C-Suite Level Execs Need Email Encryption

Email scams such as phishing and spoofing can have an impact at any level of any organization. But as executive-level employees tend to have access to the most sensitive, important, and financially appealing information, it’s little wonder that scammers tend to target the C-suite level. In fact, according to a 2022 report by Verizon titled the Data Breach Investigations Report, company executives are six times more likely than lower-level employees to fall victim to email scams or cyberattacks.

There have been some significant examples of business email compromise recently. For instance, in 2019, the Toyota Boshoku Corporation lost $37 million after information in a payment direction was changed. The 2020 SolarWinds attack was also one of the biggest supply chain attacks in history, with the effects expected to be felt in the industry for years to come.

So, perhaps it is not surprising that companies are looking for ways to protect executive-level employees, reputations, and sensitive information. Encrypted email forms a large part of these defenses, but it may be the case that many existing applications are not fit for purpose or are at best vulnerable to attack.

The Importance of Encryption

Not using encrypted email services can leave enterprises open to a high level of risk. Data breaches can significantly impact any organization in terms of financial costs and severe fines. As the examples above outlined, even seemingly minor breaches in email security can have disastrous and far-reaching consequences.

Some of the main threats to C-suite executives include phishing scams, which aim to trick users into handing over sensitive information. Cyberattackers might try to create false accounts that spoof or mimic a trusted user’s details. And by their nature, C-suite-level emails will often contain important information that is more enticing to cyberattackers.

Of course, not just executives need to be protected, as more junior colleagues within the organization can be utilized to instigate more serious breaches. However, C-suite level execs should see it as part of their role to set a good example of overall cybersecurity for the business.

Email Encryption Solutions for C-Suite Execs

Executives need a reliable way to protect their communications, which involves providing an easy-to-use email channel that is both highly secure and impossible for scammers to breach. This should integrate with existing email solutions and provide a separate channel for secure email communications. Encryption should be at the center of any email security system.

There are two main types of encrypted email in use today. One is called Transport Layer Security (TLS), which is the primary encryption tool used by major email providers. However, this can be vulnerable to phishing scams or hacking.

The other type of email encryption is called end-to-end, which is the more secure option. Messages are encrypted by the sender but can only be decrypted by the recipient, using a combination of public and private keys. This offers a higher level of security to executives, especially those dealing with sensitive information, as cyberattackers cannot replicate the private key needed to access the email and the information contained inside. And because all the encryption is done ‘behind the scenes’, there is no need for passwords or excessive admin that can interrupt business flow.

Contact Information:

Name: Michael Bertini
Email: michael.bertini@iquanti.com
Job Title: Consultant

Stock Quote API & Stock News API supplied by www.cloudquote.io
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the following
Privacy Policy and Terms Of Service.