Switches Monitoring

security

Real-time 24×7 monitoring of your routers & switches to ensure that any possible network incident can be prevented.

Cyber attacks against our nation continue to occur across networks. Based on DHS Secretary Janet Napolitano’s testimony to the Senate in 2012, in 2011 alone, the DHS U.S. Computer Emergency Readiness Team (US-CERT) received more than 100,000 incident reports and released more than 5,000 actionable cybersecurity alerts and information products. In January 2013, Twitter, the Wall Street Journal, New York Times, and the Department of Energy each reported that their systems had been breached. So far as we know, these attacks have only been successful at probing our systems and compromising data. However, a successful attack on our critical infrastructures could be devastating to the public. Richard Clarke, the former special advisor on cybersecurity to George W. Bush, stated that within the first 48 hours of a cyber attack, the United States could experience, among other things: classified and unclassified network failures, large oil refinery fires and gas pipeline explosions, financial system collapse with no idea of who owns what, trains and subways derailing, and a nationwide blackout leaving cities in the dark.[5] Defense Secretary Leon Panetta stated in October 2012 that, “a cyber attack perpetrated by nation states or violent extremist groups could be as destructive as the terrorist attack of 9/11…Such a destructive cyber terrorist attack could paralyze the nation”.

In 2004 the California State Legislature passed California Assembly Bill 1950 which also applies to businesses that own or maintain personal information for California residents. This regulation dictates that businesses maintain a reasonable level of security and that these required security practices also extend to business partners. This regulation is an improvement on the federal standard because it expands the number of firms required to maintain an acceptable standard of cybersecurity. However, like the federal legislation, it requires a “reasonable” level of cybersecurity, which leaves much room for interpretation until case law is established.

Leave a Reply

Your email address will not be published. Required fields are marked *