About Cabling Installation & Maintenance

Our mission: Bringing practical business and technical intelligence to today's structured cabling professionals

For more than 30 years, Cabling Installation & Maintenance has provided useful, practical information to professionals responsible for the specification, design, installation and management of structured cabling systems serving enterprise, data center and other environments. These professionals are challenged to stay informed of constantly evolving standards, system-design and installation approaches, product and system capabilities, technologies, as well as applications that rely on high-performance structured cabling systems. Our editors synthesize these complex issues into multiple information products. This portfolio of information products provides concrete detail that improves the efficiency of day-to-day operations, and equips cabling professionals with the perspective that enables strategic planning for networks’ optimum long-term performance.

Throughout our annual magazine, weekly email newsletters and 24/7/365 website, Cabling Installation & Maintenance digs into the essential topics our audience focuses on.

  • Design, Installation and Testing: We explain the bottom-up design of cabling systems, from case histories of actual projects to solutions for specific problems or aspects of the design process. We also look at specific installations using a case-history approach to highlight challenging problems, solutions and unique features. Additionally, we examine evolving test-and-measurement technologies and techniques designed to address the standards-governed and practical-use performance requirements of cabling systems.
  • Technology: We evaluate product innovations and technology trends as they impact a particular product class through interviews with manufacturers, installers and users, as well as contributed articles from subject-matter experts.
  • Data Center: Cabling Installation & Maintenance takes an in-depth look at design and installation workmanship issues as well as the unique technology being deployed specifically for data centers.
  • Physical Security: Focusing on the areas in which security and IT—and the infrastructure for both—interlock and overlap, we pay specific attention to Internet Protocol’s influence over the development of security applications.
  • Standards: Tracking the activities of North American and international standards-making organizations, we provide updates on specifications that are in-progress, looking forward to how they will affect cabling-system design and installation. We also produce articles explaining the practical aspects of designing and installing cabling systems in accordance with the specifications of established standards.

Cabling Installation & Maintenance is published by Endeavor Business Media, a division of EndeavorB2B.

Contact Cabling Installation & Maintenance

Editorial

Patrick McLaughlin

Serena Aburahma

Advertising and Sponsorship Sales

Peter Fretty - Vice President, Market Leader

Tim Carli - Business Development Manager

Brayden Hudspeth - Sales Development Representative

Subscriptions and Memberships

Subscribe to our newsletters and manage your subscriptions

Feedback/Problems

Send a message to our general in-box

 

Mimecast: Email Security Best Practices Every Employee Should Know

NEW YORK - June 4, 2021 - (Newswire.com)

According to a report from IBM Security and the Ponemon Institute, data breaches cost organizations an average of $3.86 million per attack between August 2019 and April 2020. While secure email services have built-in data protection, human error is a significant cause of data breaches. Every employee can take steps to prevent unauthorized access to the company's information.

Don't use weak passwords

Weak passwords lead to stolen data. If a thief can figure out someone's password, it's easy to log in and access sensitive information. Employees shouldn't use a password based on information that's public or easy to guess, such as their birthday, company's name, or simple words such as "password." A password manager can help to keep track of complex passwords that are more secure.

Watch out for fraudulent emails

Attackers often trick employees into actions that put the company's data at risk. Ransomware and phishing are two of the biggest threats to security.

Choosing modern secure email services can help take this burden off employees by flagging suspicious senders, sandboxing attachments and using browser isolation to eliminate the impact of suspicious links.

Suspicious links lead to ransomware

Ransomware involves kidnapping data and charging its owner a ransom to unlock it. The thief sends an email that tricks an employee into clicking on a link that downloads malware, which is software that encrypts data. Once the malware encrypts the data, the thief charges the victim to unlock it. It's best to avoid clicking on any unverified links from unknown senders.

Phishing attacks put data at risk

Attackers send an email that looks like a legitimate request from a bank or other trusted contact. Phishing emails trick employees into revealing passwords or other personal information that allow the thief to access confidential information. Sometimes a phishing email will convince an employee to send information directly to the bad actor.

Always back up data

Backing up data creates a copy that a company can access in the event that ransomware locks the main source of their data. Companies should ideally back up data offsite automatically, but all employees should be sure to save their data on drives that are backed up. Some companies may want to encourage employees to back up data manually in between automated backups.

Prevent data leakage

Employees should learn how to keep data from leaving their office in physical form.

Secure portable devices

Employees should make sure that any device with private information locks with a passcode after a short period of inactivity. Portable devices such as phones and tablets are easily stolen, and unlocked devices give any thief full access to their private information.

Encryption software

In case a thief bypasses a portable device's locking code, encryption software will keep them from accessing sensitive information. Good encryption will also prevent data from being accessed by outsiders while 'in transit,' i.e. when an email is being sent from one person to another.




Press Release Service by Newswire.com

Original Source: Mimecast: Email Security Best Practices Every Employee Should Know
Stock Quote API & Stock News API supplied by www.cloudquote.io
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the following
Privacy Policy and Terms Of Service.