Tuesday, November 11, 2014

A Partnership Already Paying Dividends

I want to take a minute and congratulate our newest corporate partner, TraceSecurity, for winning the 2014 GRC Value Award in the IT GRC Management category by GRC analyst firm GRC 20/20.

The reason they’re being recognized as thought and service delivery leaders in this space is because they realize companies are looking for reasonable solutions that make sense and that are responsive. They’re delivering solutions that fit those criteria and it’s allowing for dynamic growth and success. We understand how critical it is for professional service companies to develop and enact functional, working, solutions to the Governance, Risk and Compliance challenges industries are facing every day.

Because of our expertise in infrastructure as a service and in security, we field a number of inquiries every month from companies wanting to form strategic alliances.  We’re meticulous in the way we design and install networks and we’re just as meticulous with who we take on as partners.

We feel joining forces with TraceSecurity allows us to deliver unmatched expertise in the area of secure network infrastructure with our ISVN® (Intelligently Scalable Virtual Network) solution.  We know our clients will be pleased with the results.



Thursday, September 25, 2014

WARNING: A severe threat greater than Heart Bleed has been revealed.

This is a very important warning, and it is recommended that any Linux-based system be patched immediately.
A bug discovered in the widely used Bash command interpreter poses a critical security risk to Unix and Linux systems – and, thanks to their ubiquity, the wider internet.
It lands countless websites, servers, PCs, OS X Macs, various home routers, and more, in danger of hijacking by hackers.
Cywest has already deployed patches to critical systems, and we are recommending that all customers do the same as quickly as possible. A reverse shell possibility also exists with this bug, requiring Cywest to isolate and shut down any breached systems.

Wednesday, September 17, 2014

Asking The Right Questions

I found myself with a career in technology for a lot of reasons but one of the most telling was due to a pursuit of knowledge.  When I was a kid my parents would be delighted by the amount of research I would do on any topic of interest.  They thought it would enable me to go far in life.  I still have a profound thirst for knowledge.  I always want to know the reasons why an action or decision has occurred.  I’m just as happy to answer any and all questions from our customer base about the service we provide.

Asking - and getting the answers to questions is something I still find many folks are unwilling to do when considering critical technology questions.  They cover the basics – they just don’t ask the more detailed questions possibly because they don’t know what they should be.  If you’re looking at an infrastructure or telecom project, these are some of the additional things I’d want to know.  I encourage you to compare the answers we give to any of our competitors.

1.    What is the average retention rate of the company’s customer base?

2.    Does the provider directly operate/manage the services platform its providing or is it reselling the services of a third party?

3.    What kind of technical certifications or qualifications have the company’s employees achieved?

4.    Does the company you’re considering actually offer a broad array of services including configuration and legitimate network design?

There are a number of other things I’d want to know including any strategic partnerships the provider has with existing companies so that I was aware of any synergy with companies I already used but if you just start by asking the four listed above you’ll be off to a good start in your research.

Wednesday, June 25, 2014

International Legal Technology Association (ILTA) Roadshow - Salt Lake City

Cywest hit the road last week for our first ILTA roadshow of  2014. We were honored to work with ILTA in providing educational content and talk with some of the legal industry's thought leaders about what the future of network security looks like. The main topic of the show was "New Encryption Strategies For Communications".

Clients are beginning to demand that law firms address security in a more proactive manner and Cywest is leading the way with its innovative encryption technology that is embedded in the Intelligently Scalable Virtual Network (ISVN).

There was a lively discussion and one attendee even gasped as we demonstrated ways that today's threat actors go about obtaining sensitive and proprietary information. We realize the value in putting our minds together to solve today's challenges. Listen to what some of the attendees said.

"Very informative!'

"Great info."

We are really looking forward to the next show! Houston here we come!

Tuesday, May 27, 2014

Cywest at 2014 ILTA LegalSEC® Summit

Cywest is proud to be presenting at the 2014 ILTA LegalSEC® Summit on June 11th and 12th at the Westin Lombard in Chicago. This special two day event is a gathering of experts from across the legal industry security field talking about their experiences and sharing best practices for strategic information technology leaders tasked with managing their own vulnerable infrastructures.

We are delivering the first of its kind approach to network security and excited to offer a glimpse at that technology during this year’s summit. With internal and external security threats looming on the horizon it is important to take a more pro-active and innovative approach to securing your confidential and proprietary information. Law firms must be diligent in addressing these challenges by implementing industry standard technologies, performing reviews of their providers, and including the right contract provisions in their agreements.

But is that enough? Cywest believes that the magnitude of the problem necessitates that law firms go well beyond the norm. The future of network design will include 24/7/365 proactive network monitoring, innovative encryption technologies and regular auditing to test the integrity of your network with services like vulnerability scanning and penetration testing. All of this needs to be done without affecting the performance or availability of the network and without significantly increasing IT spend.

If you’re coming to the show, we invite you to stop by Booth 10 and take a peak at our ISVN® (Intelligently Scalable Virtual Network) offering and how its embedded Expert Security Services include the following:

• Network Security Assessments
• 24/7/365 Proactive Network Monitoring
• Penetration Testing
• Encryption as a Service (EaaS)

Wednesday, April 30, 2014

State of the Industry – Q2 Snapshot

I thought I’d comment on two recent studies centered around trends in the telecommunications area that are generating a number of headlines with different providers. Interestingly, both studies point to a common trend, that the majority of companies are wholly unprepared to handle the continuing increase in demand required by cloud computing, social media, mobile devices and data analytics. In fact, according to an IBM analysis of more than 750 CIOs across the country, less than 10% say their infrastructure is properly scaled to meet demand and 62% intend to increase infrastructure spending over the next 18 months in order to try and meet the demand. The IBM study also points out that 46% of respondents struggle with maintaining a secure environment and self-admit that they lack a strategic infrastructure road map. The full study will be published in July but the preliminary results do not come as a surprise to us. We see many of the same issues confronting both our existing and prospective customers during our conversations.

Thankfully, according to another just released study by Akamai, the world just recently reached a critical plateau in terms of available average connection speed in that all ten of the most populated countries or regions in the globe now surpass the high broadband threshold. In fact, on a year over year comparison, global average peak connection speeds increased 38% in the fourth quarter of 2013 compared to 2012 and analysts forecast another sizable jump when the end of year numbers come in for 2014.

All of this means it’s a buyers market out there and a good time to evaluate your options about infrastructure planning – even if your existing contract has plenty of months remaining. These types of projects require significant advanced planning to deliver quality service and a clean, painless transition

Tuesday, April 1, 2014

Big Telco Customer Service Levels Rise?

In a joint news conference today, the major domestic telecom carriers announced that they were adopting new customer service protocols for all customers.  "We believe that, as a group, we can do much better by the people who use our networks," said organization leader Jack B. Quick in a prepared statement, "it's time for us to work together and to take responsibility for our service rather than blame the local loops or the communications equipment at a customer's location.  In fact, we are so tired of finger pointing that we're literally cutting our fingers off just to show how serious we are."  Mr. Quick attempted to wave to the crowd following the announcement but onlookers were horrified by the bloody stumps on his hands where his fingers used to be.

Hopefully you realize this is an April Fool's Joke.  Sadly it's probably more likely for Telco execs to cut off their fingers than to improve their customer service commitments and take true responsibility for the performance of your services.   That's why customer service is - and will always be - our most important deliverable to our clients.