Friday, August 26, 2016

Tabula Rosa Systems Blog Of 8/26/2016 - Global IT Security Spending Will Top $81 Billion In 2016



 
From informationweek.com 
Gartner predicts worldwide spending on information security products and services will reach $81.6 billion in 2016 -- an increase of 7.9% from last year.

Global spending on information security products and services will reach $81.6 billion in 2016, according to a new report from Gartner. This prediction marks an increase of 7.9% from last year.
The largest areas of information security spending are consulting and IT outsourcing, Gartner stated. Security testing, IT outsourcing, and data loss prevention (DLP) will be the biggest opportunities for growth through the end of 2020.
Another crucial area of industry growth is preventive security. Many IT pros tend to opt for preventive measures when planning their security strategies, a trend poised to continue in years to come.
[Read: 'QuadRooter' security flaw leaves 900M Android devices vulnerable.]
However, preventive measures have proven weak in blocking cyberattacks. As a result, more organizations have adopted the detection-and-response approach to strengthen their security.
Security technologies, such as security information and event management (SIEM) and secure web gateways (SWG) are expected to evolve to support this trend. In particular, SWG tech will maintain a 5% to 10% growth through 2020.
"Organizations are increasingly focusing on detection and response, because taking a preventive approach has not been successful in blocking malicious attacks," said Gartner senior research analyst Elizabeth Kim in a statement. "We strongly advise businesses to balance their spending to include both."
Kim said she anticipates security spending will evolve to become more service-driven as businesses continue to struggle with an overall lack of cyber-security talent in the industry.
Managed detection and response (MDR) is growing as organizations are challenged to use both technology and human expertise to pinpoint risks and maintain a safe cyber environment. This is especially relevant in addressing insider threats and targeted advanced threats.
In its report, Gartner dives into a few specific areas of security where businesses are predicted to spend their security budgets this year.
For example, the average price of firewalls will increase by a minimum of 2% to 3% year-over-year through the end of 2018. As organizations demand greater bandwidth and more devices, se
By 2019, half of midsize and large businesses will implement larger and more advanced inspection features to their network firewalls. In addition to larger bandwidth and better performance, businesses will also need their firewalls to group together other features such as intrusion prevention and web filtering.
Ninety percent of businesses are forecast to adopt at least one form of DLP by 2018; currently, only half of them do. Many organizations launch DLP for regulatory compliance and IP protection, but new technologies will also provide machine learning, data-matching, image analysis, and user entity and behavior analytics.
Some areas of information security are lagging behind. Consumer security software, endpoint protection platforms, and secure email gateways are exhibiting slower growth as a result of commoditization, Gartner noted.
While the purchase and implementation of new security technologies is key to protecting businesses, so is the development of cyber-security skills in employees. The shortage of skilled security professionals is both dangerous and expensive. It leaves businesses vulnerable to attacks resulting in reputational damage and data loss.
The most highly technical skills are the ones in greatest demand. Businesses are seeking pros with expertise in software development, attack mitigation, intrusion detection, network monitoring, and other areas of cyber-security.
==========================================
Another Special Announcement - Tune in to my radio interview,  on Rider University's station, www.1077thebronc.com I discuss my recent book, above on "Your Career Is Calling", hosted by Wanda Ellett.   
In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County, NJ.


I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services.  Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.

Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology marketplace.Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.
=============================================================

Thursday, August 25, 2016

Tabula Rosa Systems Security Bulletin Vai US-CERT - Apple Releases Security Update - 8/25/2016








National Cyber Awareness System:

08/25/2016 03:53 PM EDT

Original release date: August 25, 2016
Apple has released a security update to address multiple vulnerabilites in iOS. Exploitation of some of these vulnerabilities may allow a remote attacker to take control of an affected system. The update is for iPhone 4s and later, iPad 2 and later, and iPod touch (5th generation) and later.
US-CERT encourages users and administrators to review the Apple security page for iOS 9.3.5 and apply the necessary update.


============================================

Another Special Announcement - Tune in to my radio interview,  on Rider University's station, www.1077thebronc.com I discuss my recent book, above on "Your Career Is Calling", hosted by Wanda Ellett.   

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County, NJ.


I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services.  Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.

Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology marketplace.Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.
=============================================================

Wednesday, August 24, 2016

Tabula Rosa Systems Blog Of 8/24/2016 - What Is Edge Computing?












Edge computing from whatis.com
Edge computing is a distributed information technology (IT) architecture in which client data is processed at the periphery of the network, as close to the originating source as possible. The move toward edge computing is driven by mobile computing, the decreasing cost of computer components and the sheer number of networked devices in the internet of things (IoT). Depending on the implementation, time-sensitive data in an edge computing architecture may be processed at the point of origin by an intelligent device or sent to an intermediary server located in close geographical proximity to the client. Data that is less time sensitive is sent to the cloud for historical analysis, big data analytics and long-term storage.
Transmitting massive amounts of raw data over a network puts tremendous load on network resources. In some cases, it is much more efficient to process data near its source and send only the data that has value over the network to a remote data center. Instead of continually broadcasting data about the oil level in a car's engine, for example, an automotive sensor might simply send summary data to a remote server on a periodic basis. Or a smart thermostat might only transmit data if the temperature rises or falls outside acceptable limits. Or an intelligent Wi-Fi security camera aimed at an elevator door might use edge analytics and only transmit data when a certain percentage of pixels significantly change between two consecutive images, indicating motion.
Edge computing can also benefit remote office/branch office (ROBO) environments and organizations that have a geographically dispersed user base. In such a scenario, intermediary micro data centers or high-performance servers can be installed at remote locations to replicate cloud services locally, improving performance and the ability for a device to act upon perishable data in fractions of a second. Depending upon the vendor and technical implementation, the intermediary may be referred to by one of several names including edge gateway, base station, hub, cloudlet or aggregator.
A major benefit of edge computing is that it improves time to action and reduces response time down to milliseconds, while also conserving network resources. The concept of edge computing is not expected to replace cloud computing, however. Despite its ability to reduce latency and network bottlenecks, edge computing can pose significant security, licensing and configuration challenges.
Security challenges: Edge computing's distributed architecture increases the number of attack vectors. The more intelligence an edge client has, the more vulnerable it becomes to malware infections and security exploits.

Licensing challenges: Smart clients can have hidden licensing costs. While the base version of an edge client might initially have a low ticket price, additional functionalities may be licensed separately and drive the price up.

Configuration challenges: Unless device management is centralized and robust, administrators may inadvertently create security holes by failing to change the default password on each edge device or neglecting to update firmware in a consistent manner, causing configuration drift.
The name "edge" in edge computing is derived from network diagrams; typically, the edge in a network diagram signifies the point at which traffic enters or exits the network. The edge is also the point at which the underlying protocol for transporting data may change. For example, a smart sensor might use a low-latency protocol like MQTT to transmit data to a message broker located on the network edge, and the broker would use the hypertext transfer protocol (HTTP) to transmit valuable data from the sensor to a remote server over the Internet.
The OpenFog consortium uses the term fog computing to describe edge computing. The word "fog" is meant to convey the idea that the advantages of cloud computing should be brought closer to the data source. (In meteorology, fog is simply a cloud that is close to the ground.) Consortium members include Cisco, ARM, Microsoft, Dell, Intel and Princeton University.
========================================

Another Special Announcement - Tune in to my radio interview,  on Rider University's station, www.1077thebronc.com I discuss my recent book, above on "Your Career Is Calling", hosted by Wanda Ellett.   

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County, NJ.


I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services.  Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.

Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology marketplace.Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.
=============================================================

Tuesday, August 23, 2016

Core Netiquette For Thank You Notes For Job Seekers - Tabula Rosa Systems Blog Of 8/23/2016





 =========================================
From about.com
Sending a thank you email or note after a job interview can help you get chosen for a second interview or even a job offer. On the flip side, writing the wrong thing can make an employer think twice about moving forward.
Keep it Positive
The quality of your follow-up communication after an interview will impact an employer’s evaluation of your candidacy.   Sending a thank you note matters, but it needs to be a good one not just a quick “thanks for the interview” email message.
It’s important to emphasize how well the job fits with your background, as well as your strong motivation to work in that position with that employer.  In addition, you will want to avoid saying anything that will raise any doubts about your attitude, motivation or qualifications.
10 Things Not to Include in a Thank You Letter for an Interview
These tips on what not to include in your follow up letter can help you avoid sending the wrong message to employers.  
1. Don't include only a statement of appreciation.  Make sure you also affirm your strong interest in the job and briefly explain why the position is an excellent fit.  Here’s what to include in an interview thank you letter.
2. Your communications are samples of your writing skills and attention to detail. Don’t forget to proofread carefully, and correct any spelling or grammatical errors, and make sure you have the correct job title, address and name. This is an opportunity to follow up with a strong positive impression, so don’t make even a small mistake.
Here are proofreading tips for job seekers.
3. Do not mention salary range in your letter.  Wait until an offer is made to negotiate salary, since your leverage will be the greatest once the employer has decided that you are the preferred candidate.  
4. Don't make any excuses or apologies for anything that went wrong during the interview.  You are better off not drawing attention to these issues.  Emphasize positive qualities that might counter any concerns that came up during your meeting.  An exception would be if you think the interview was so bad that you’re out of contention. Here’s how to handle a blown interview.
5. Don’t mention any aspects of the position that cause you to question the suitability of the job.  Wait until an offer has been extended to gain further clarification about components of the role that concern you.  Don't give the employer any reasons to question whether you are a good match prior to finalizing their selection.  An exception to this guideline may be when you know you don’t want the job, but you like the company.  In that case, you might mention how impressed you were with the organization and ask if there might be another position that was more suitable.
6. Don't include the exact same language in letters if you are sending them separately to different interviewers.  Think of something each person shared which was helpful or stoked your interest.  Another approach is to reaffirm assets that would help you to address priorities that the individual had mentioned. Interviewers will be impressed if you take the time to personalize your communications.
7. Don’t make unsubstantiated or exaggerated statements like "The job is a perfect match for my background.” Be sure to include a statement to support your comments.  For example, you might say "I am very excited about the possibility of landing the public relations associate job since it would enable me to apply my strong writing, event planning and media relations skills."
8. Don't take an overly aggressive approach by mentioning you will call to check on the status of your candidacy. You certainly can make a follow-up call towards the end of the time window that the employer has indicated for their decision.  You just don't need to mention this in your letter.
9. Don't include references unless you’re asked for them.  There is no need to include references with your follow up correspondence. When an employer wants a list of references they will ask you for one.
10. Don't include any questions about reimbursements for your interviewing expenses.  Your follow up communication should be sent as soon as possible after the interview.  Your letter should be exclusively focused on your interest in the job and how well it fits.  Any other information can distract from your message.  Send a separate note later to deal with any reimbursement issues.
==================================================== 
Have you ever wondered how it would be if your email suddenly came to life? You are about to find out.
====================================================
https://www.youtube.com/watch?v=HTgYHHKs0Zw
===========================================================

**Important note** - contact our sister company for very powerful solutions for IP management (IPv4 and IPv6, security, firewall and APT solutions:

www.tabularosa.net

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” will be published soon follow by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:
==============================================================



Special Bulletin - My just released book, "You're Hired. Super Charge our Email Skills in 60 Minutes! (And Get That Job...) is now on sales at Amazon.com

 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  Additionally, I provide content for an online newsletter via paper.li. I have also established Netiquette discussion groups with Linkedin and Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. Further, I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and have been a contributor to numerous blogs and publications. 

Lastly, I am the founder and president of Tabula Rosa Systems, a company that provides “best of breed” products for network, security and system management and services. Tabula Rosa has a new blog and Twitter site which offers great IT product information for virtually anyone.
==============================================
 

Monday, August 22, 2016

Tabula Rosa Systems Blog Of 8/22/2016 - US CERT SB16-235: Vulnerability Summary for the Week of August 15, 2016












National Cyber Awareness System:

08/22/2016 06:54 AM EDT

Original release date: August 22, 2016
The US-CERT Cyber Security Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) in the past week. The NVD is sponsored by the Department of Homeland Security (DHS) National Cybersecurity and Communications Integration Center (NCCIC) / United States Computer Emergency Readiness Team (US-CERT). For modified or updated entries, please visit the NVD, which contains historical vulnerability information.

==========================================

Another Special Announcement - Tune in to my radio interview,  on Rider University's station, www.1077thebronc.com I discuss my recent book, above on "Your Career Is Calling", hosted by Wanda Ellett.   

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County, NJ.


I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services.  Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.

Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology marketplace.Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.
=============================================================