About Cabling Installation & Maintenance

Our mission: Bringing practical business and technical intelligence to today's structured cabling professionals

For more than 30 years, Cabling Installation & Maintenance has provided useful, practical information to professionals responsible for the specification, design, installation and management of structured cabling systems serving enterprise, data center and other environments. These professionals are challenged to stay informed of constantly evolving standards, system-design and installation approaches, product and system capabilities, technologies, as well as applications that rely on high-performance structured cabling systems. Our editors synthesize these complex issues into multiple information products. This portfolio of information products provides concrete detail that improves the efficiency of day-to-day operations, and equips cabling professionals with the perspective that enables strategic planning for networks’ optimum long-term performance.

Throughout our annual magazine, weekly email newsletters and 24/7/365 website, Cabling Installation & Maintenance digs into the essential topics our audience focuses on.

  • Design, Installation and Testing: We explain the bottom-up design of cabling systems, from case histories of actual projects to solutions for specific problems or aspects of the design process. We also look at specific installations using a case-history approach to highlight challenging problems, solutions and unique features. Additionally, we examine evolving test-and-measurement technologies and techniques designed to address the standards-governed and practical-use performance requirements of cabling systems.
  • Technology: We evaluate product innovations and technology trends as they impact a particular product class through interviews with manufacturers, installers and users, as well as contributed articles from subject-matter experts.
  • Data Center: Cabling Installation & Maintenance takes an in-depth look at design and installation workmanship issues as well as the unique technology being deployed specifically for data centers.
  • Physical Security: Focusing on the areas in which security and IT—and the infrastructure for both—interlock and overlap, we pay specific attention to Internet Protocol’s influence over the development of security applications.
  • Standards: Tracking the activities of North American and international standards-making organizations, we provide updates on specifications that are in-progress, looking forward to how they will affect cabling-system design and installation. We also produce articles explaining the practical aspects of designing and installing cabling systems in accordance with the specifications of established standards.

Cabling Installation & Maintenance is published by Endeavor Business Media, a division of EndeavorB2B.

Contact Cabling Installation & Maintenance

Editorial

Patrick McLaughlin

Serena Aburahma

Advertising and Sponsorship Sales

Peter Fretty - Vice President, Market Leader

Tim Carli - Business Development Manager

Brayden Hudspeth - Sales Development Representative

Subscriptions and Memberships

Subscribe to our newsletters and manage your subscriptions

Feedback/Problems

Send a message to our general in-box

 

Don’t Let Hackers Hold You Hostage: How to Prevent Ransomware Attacks

Don’t Let Hackers Hold You Hostage: How to Prevent Ransomware AttacksPhoto from Unsplash

Originally Posted On: https://www.tfnbtx.com/dont-let-hackers-hold-you-hostage-how-to-prevent-ransomware-attacks/

 

It’s a nightmare scenario faced by thousands every year.

You’re working on your computer or scrolling on your phone when, suddenly, your device stops working. A threatening message appears on your screen, informing you that some cyber-criminal has hijacked your machine and seized control of all of your sensitive data. If you want it back, the message says you’ll have to pay the price.

You’ve been infected with ransomware—malware that holds a person’s or company’s data hostage until they pay money, or a “ransom,” to get it back. Once your device is infected, the malware locks your computer and the bad actors behind it demand a payment in exchange for the key.

These attacks are on the rise and it seems like nearly every day there is news about cybercriminals taking down entire organizations. Hospitals crippled by ransomware attacks during the pandemic were forced to turn away patients and an attack on the United State’s largest fuel pipeline caused widespread panic at the pump.

Major ransomware attacks like those seen over the last two years have demonstrated how significant the problem has become as cyberattacks disrupted people’s lives,” says Gerald Zgabay, TFNB’s VP of Information Security.

While attacks on high-profile organizations like the ones above may make headlines, any individual or business can be a target. In fact, one study shows that small and medium-sized businesses compromise 70% of all ransomware attacks.

An Ounce of Prevention: How to Protect Yourself From Ransomware

The data shows that the threat of a ransomware attack is very real no matter who you are—so how do you defend against it? While there’s not a silver bullet to protect you from cyber criminals, the best-known cure against ransomware is diligent prevention.

“There is no perfect approach to preventing ransomware; however, simple preventive measures can ensure that you have a fighting chance like multi-factor authentication, education, patching, air-gapped and immutable data backups,” says Zgabay.

At TFNB, we take the protection of your personal and financial information very seriously and want to give you the resources you need to protect yourself. Gerald Zgabay, TFNB’s VP of Information Security, and TFNB’s IT Officer, Adam Dooley have assembled a list of tips that should be top of mind for anybody conducting sensitive online transactions—like logging onto your bank account—or even just accessing the internet in general.

By following the advice below, you can reduce the odds of finding yourself in front of a locked laptop and protect your data from getting into the hands of criminals.

  • Back Up Your Data

Back up your computer and other devices regularly, and keep those backups in a different place other than your main system. You can do this by using an external hard drive or a cloud syncing service. If you’re the victim of an attack, you can rest easy knowing that all data they just locked down or destroyed is safe on another system that they can’t touch.

You’ll also want to make sure that critical data stays out of reach, so keep data backups unplugged from the network or computer when not in use.

  • Strengthen Your Passwords And Enable Multi-Factor Authentication

With the right username and password, hackers can get a hold of the data on your devices, as well as your backup files in the cloud. Use strong passwords that are different for all of your accounts, and while you’re at it, make sure that you’ve turned on two-factor authentication everywhere—that means that something else (such as a code sent directly to you) is required to log in to your accounts in addition to a username and password.​​​​​​​

  • Don’t Click On Suspicious Links or Attachments

Ransomware criminals often send malicious files or links over email, so take advantage of the spam and virus filters offered by your email provider. The savviest among them will try to bypass these filters and lower your guard by disguising their email address to look like the message is coming from someone you know or an organization you trust.

Always exercise caution when opening email attachments and links—even if the email seemingly appears to look “real.” If you are unsure whether an email is legitimate, try to verify it by finding the sender’s contact information using other sources other than the email and contacting them directly.

  • Update Your Software

Updating your computer software and third-party patches as they are rolled out is one of the easiest and most important ways to stave off cyber threats. Criminals often take advantage of the security vulnerabilities found in older or unpatched software, which is why it’s vital that everything running on your computer is up-to-date with at least the latest security updates.

 

At TFNB, Your Protection is Our Priority

As with any security threat, it’s impossible to eradicate the risk of ransomware, but the tips we’ve provided here should help minimize the odds of you becoming a target​​​​​​​. If the worst should happen, remember that ransomware is a crime, and you can report it to the Cybersecurity & Infrastructure Security Agency website here.​​​​​​​

As a TFNB customer, you can rest assured knowing that we’re making every effort to protect your online information. We use a slew of security measures, like biometric authentication, encryption, and anti-virus software that give you greater security as you manage your money. And while we use world-class technology, you’ll still receive the friendly, personable service that you expect from a neighborhood bank. Still curious about how we keep your information safe? Call or visit one of your local bankers today. We’d be happy to chat.

Stock Quote API & Stock News API supplied by www.cloudquote.io
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the following
Privacy Policy and Terms Of Service.