MDL Technology Takes a Look at the Importance of Network Monitoring

Network monitoring might sound like the easiest and most simplistic part of an IT managed service. While it doesn’t take much to monitor your network and ensure everything is working properly, it’s surprising how many companies overlook this essential component. The idea behind network monitoring is simple: keep a constant eye on your network to catch failing components or components that are running slow before they become a problem. A good monitoring system lets your administrator know of any issues with the network so that they can be addressed before they get out of hand. A business without constant network monitoring  runs the risk of losing a good deal of…

Details

MDL Technology Examines ESPN’s Week 1 Fantasy Football Flop

The worldwide leader of sports, ESPN, suffered a worldwide fumble on week 1 of the NFL season. The lauded fantasy football app crashed at one of the most inopportune times possible. The blunder shows that if you are not prepared for the absolute worst, the absolute worst will happen. Geekwire estimates that over 74 million people play fantasy football, with the first week of hope being the biggest fantasy weekend by far.   ESPN has acknowledged the issues and has since blamed a backend data access issue. A simple misguided network monitoring problem put the app down for over four hours. Which is roughly the equivalent of one full game…

Details

MDL Technology Examines How OPM Could Have Avoided a Giant Data Breach

In a breach that was first publicly announced mid-2015, the U.S. House Oversight & Government Reform Committee has finally came to a consensus on the root of the issue. With a 241-page analysis of the data breach, they have found that the U.S. Office of Personnel Management (OPM) exposed fingerprint data and background investigations on millions of Americans.   Data breaches can be a giant deficit to a company. Not only did someone hack into their system, but also losing trust of employees and business partners. Inverse said, “It all could have been prevented very easily.” Cyber security may seem like a small part of your overall operation, but giant…

Details

Kansas City-Based IT Company Examines How Delta Could Have Avoided Thousands of Cancelled Flights

During the dates of Aug. 8 – 10, 2016, customers who flew with Delta airlines experienced thousands of great delays or cancelled flights. As a direct result, the unfortunate event cost the airline financially and their public image was hurt. Could this all been prevented if they were up to date on their network monitoring?   According to Information Management, it very well could have been prevented. Their IT system was simply outdated for today’s times. Information Management also explained that Delta is not the first to suffer from this issue, “Just a month ago, Southwest Airlines dealt with a similar scenario in which a broken router caused another 2,300…

Details

Kansas City Managed Services Company Clears the Clouds: A Start to Finish Guide to Selecting Cloud Computing Services

The cloud is everywhere. Whether you work in a small business or a large enterprise, chances are your company already has or will soon adopt a cloud computing system. As a team leader, it is important to consider the qualifications and needs of cloud computing before implementation. MDL Technology shares a guide to help understand and choose a cloud system.   Know Your Stuff It is a common misconception that there is one almighty cloud lingering above our heads at all times. While the cloud never disappears, it is divided. There is a wide variety of different types of cloud systems which serve different functions for a plethora of needs.…

Details

MDL Technology Identifies Three Challenges to Big Data Security

In the digital world, business owners have no choice, but to keep up with technological advancements and to analyze major trends in their industry. With increasing incidents of data breaches, cyber attacks and compromised private information, it becomes all the more essential to take extra precaution to protect data sets. However, in order to protect the integrity of big data, business owners must first understand and identify their system’s points of weakness.     Human Error In short, data breaches occur when an outside source finds a hole, or vulnerability, within a company’s tech infrastructure. Oftentimes, the vulnerability comes from a human error due to misinformation or not enough IT…

Details

Kansas City-Based IT Company Explores Why the 2016 Olympic Games at Rio Has Yet to Endure a Major Cybersecurity Breach

  The 2016 Olympic Games in Rio de Janeiro, Brazil, have had their fair share of problems leading up to and during the games including unsold tickets, green swimming pools, the Zika virus and more. However, one daunting issue they have successfully prevented is a major cybersecurity breach.   According to Business Insider, a report from August 2, 2016, showed that the volume of malicious and phishing artifacts in Brazil is on the rise. Moreover, the country saw an 83 percent increase in malicious URLs, compared to a mere 16 percent worldwide, and Brazil has been attacked by phishing attempts more than any other country, with the main targets being…

Details

Disaster Recovery 101

Studies from the Disaster Recovery Preparedness Council show that an overwhelming majority of companies would fail in the event of a data disaster. The reason for this is simply misunderstanding and misinformation. Check out these easy-to-understand pointers on disaster recovery basics to help improve your company’s disaster recovery plan. Disaster Recovery Plan A disaster recovery plan (DRP) is a plan set up to manage and retain as many assets as possible in the event, and in the aftermath, of a cyber event that threatens or destroys all or part of a company’s digital resources. According to Computer Weekly, elements that will determine how to create your DRP include people, physical…

Details

Kansas City Technology Firm Explains White House Cyber Directive

The White House has released a detailed Presidential Policy Directive on what qualifies a “significant” breach and what officials should be doing to help mitigate damage. For the first time, there is a categorical system defined by White House and government officials for victims of cyber-attacks.   The rise in cyber-crimes has remained a critical threat to the health of some the world’s largest and most impactful companies, as well posing a fatal threat to thousands of SMBs. In an effort to create a unified response for crimes against companies both large and small, the White House has adopted a comprehensive framework used to determine the severity and urgency of…

Details

The Real Cost of a Data Breach

When planning the annual security budget for your office, many expenses make the list such as security cameras, FOB key entry and a new alarm system, but what about a different type of security threat? We’re talking about your business’s cyber security. Cyber security, like traditional security, is a necessary precaution to take in order to best protect your company, assets, information and staff. If there is no real form of protection or prevention, the costs of a data breach can be insurmountable.   Ponemon Institute recently partnered with IBM and released a study on the true costs of data breaches in the United States. Here are some of the…

Details