Bob Young on LinkedIn: #callmeifyouneedme #fifonetworks #cybersecurity #networkarchitecture (2024)

Bob Young

IT/OT Network Training, Consulting, Cybersecurity | “IT by the hour” for small business and SOHO | Data and account recovery when a loved one dies | Cybersecurity - Networks - Wireless – Telecom – VoIP | Nationwide

  • Report this post

When you’re new to the field, a lot of information systems look secure and stable. But after you’ve been responsible for recovering from a few massive outages, you start to consider the ramifications of resource centralization.#callmeifyouneedme #fifonetworks#cybersecurity #networkarchitecture

  • Bob Young on LinkedIn: #callmeifyouneedme #fifonetworks #cybersecurity #networkarchitecture (2)

16

2 Comments

Like Comment

Hrishikesh S.

Assistant Manager | Master of Science in Cybersecurity

1d

  • Report this comment

Great insights, Bob Young ! Resource centralization does come with significant risks that only become apparent with experience. It's crucial to balance efficiency with resilience in network architecture. Thanks for sharing this valuable perspective!

Like Reply

1Reaction

To view or add a comment, sign in

More Relevant Posts

  • Bob Young

    IT/OT Network Training, Consulting, Cybersecurity | “IT by the hour” for small business and SOHO | Data and account recovery when a loved one dies | Cybersecurity - Networks - Wireless – Telecom – VoIP | Nationwide

    • Report this post

    If you use Windows, here’s an interesting little command to run: [For the local Documents folder]:dir c:\"New Folder" /s > %userprofile%\Documents\NewFolderList.txt[For the OneDrive Documents folder]:dir c:\"New Folder" /s > %userprofile%\OneDrive\Documents\NewFolderList.txtThere were only two New Folders on my computer, but one of them was created in 2009 and has been carried forward to every new computer I’ve had since then! When I ran this on my elderly mother’s computer several years ago, I found a couple of dozen New Folders scattered everywhere.Before you delete them, be careful – you may find that files were saved to the folder. The better choice may be to rename it.Command explanation:dir – Search and do a directory listingc:\ - Start at the root of drive C“New Folder” – must be in quotes because it contains a space/s – Search all subfolders (Don’t stop at c:\)> - Redirect the output to a file instead of to the screen%userprofile%\Documents\NewFolderList.txt – Path and filename for the results file#callmeifyouneedme #fifonetworks

    • Bob Young on LinkedIn: #callmeifyouneedme #fifonetworks #cybersecurity #networkarchitecture (7)

    23

    1 Comment

    Like Comment

    To view or add a comment, sign in

  • Bob Young

    IT/OT Network Training, Consulting, Cybersecurity | “IT by the hour” for small business and SOHO | Data and account recovery when a loved one dies | Cybersecurity - Networks - Wireless – Telecom – VoIP | Nationwide

    • Report this post

    Listen, this is probably going to come as a shock, but I don't have to reply at all if I'm not interested.(This applies to LI DMs, too, not just email).#email #spam

    • Bob Young on LinkedIn: #callmeifyouneedme #fifonetworks #cybersecurity #networkarchitecture (12)

    26

    16 Comments

    Like Comment

    To view or add a comment, sign in

  • Bob Young

    IT/OT Network Training, Consulting, Cybersecurity | “IT by the hour” for small business and SOHO | Data and account recovery when a loved one dies | Cybersecurity - Networks - Wireless – Telecom – VoIP | Nationwide

    • Report this post

    Are you running a Veteran Owned Small Business? You might want to get official certification of your status from the Small Business Administration. For years I’ve been using “Self-Certified” as my status, but late last year one of my major clients announced a deadline for getting certified. They’ll stop accepting “Self-Certified” for VOSB status before the end of this year. Some of the certification options cost hundreds or thousands of dollars, but you can get certified through the SBA for free.As of today, my business is certified! I’m now ready for my major client’s deadline!HOW TO DO ITThe first step is to get registered with the US Government’s System for Awards Management, SAM. This enables you to bid on US Government contracts. It’s free, but it’s time consuming. It’s about as much fun as filling out tax forms. I first got listed with SAM years ago, because it was required to work on anything for the Veteran’s Administration.Then, once you’re listed in the SAM database, you can go to the SBA website for Veteran Owned Small Businesses and go through their process. They’ll use your SAM registration as part of the verification process, to prove you’re the actual business owner.WHY YOU SHOULD DO ITIn order to work on many government projects – city and state, too, not just federal – you have to compete against other businesses. You’ll be submitting bids, and responding to RFPs (Request for Proposals) and RFQs (Request for Qualifications). Then the government agency that issued the bid request/RFP/RFQ will evaluate the responses using some sort of scoring matrix. You get extra points for being in certain categories: veteran owned, disabled veteran, woman owned, minority owned, and so on. This type of SBA certification can give you a boost, or level the playing field if you’re competing against other businesses who have these certifications already.#callmeifyouneedme #fifonetworks #entrepreneurship #smallbusiness

    • Bob Young on LinkedIn: #callmeifyouneedme #fifonetworks #cybersecurity #networkarchitecture (17)

    10

    Like Comment

    To view or add a comment, sign in

  • Bob Young

    IT/OT Network Training, Consulting, Cybersecurity | “IT by the hour” for small business and SOHO | Data and account recovery when a loved one dies | Cybersecurity - Networks - Wireless – Telecom – VoIP | Nationwide

    • Report this post

    You know that password manager program you use, the one with the single master password? It’s risky to leave that thing “unlocked” all the time.Convenient, yes, but less secure.Depending on your level of paranoia, you may want to close that puppy after every use.(Incidentally, when I do data and account recovery for people when a loved one dies, I’m always glad when the deceased person used a browser-based password manager, because then it is so freaking easy to get to so many things).(One more parenthetical remark, for those who want to chime in about passwordless authentication: you know as well as I do that you can’t use passwordless authentication everywhere, so don’t bother looking silly. Password managers are still an important tool).#callmeifyouneedme #fifonetworks#cybersecurity #authentication

    32

    24 Comments

    Like Comment

    To view or add a comment, sign in

  • Bob Young

    IT/OT Network Training, Consulting, Cybersecurity | “IT by the hour” for small business and SOHO | Data and account recovery when a loved one dies | Cybersecurity - Networks - Wireless – Telecom – VoIP | Nationwide

    • Report this post

    “We’re looking for someone to do penetration testing.” The inquiry came from a PUD (Public Utilities District) via the “Contact Us” page on the FIFO Networks website. I called and talked them into not hiring me.I told the contact person, “I’m the one you hire before you hire a pen tester, to get the network ready.”Real penetration testing – not just running some pre-packaged programs – involves coding skills, which I don’t have. I’m the infrastructure and policy guy.This is an ethical issue. Don’t take a gig you’re not really qualified for.THE LESSONIf you’re starting your own business, you need cash flow desperately, and you may be tempted to say yes to every job that comes along. Resist that urge. Your business will grow better, stronger – and faster – by doing jobs you can succeed at. Know where you’re great, and make referrals for the rest. Remember, the people you refer to others will later likely refer you. Build your network on strong relationships and build your business on successful projects.UPDATE: There are requirements for doing cybersecurity work for public utilities in the USA. All first-round eligible companies/persons were notified. There’s no point in telling me you’re interested.#callmeifyouneedme #fifonetworks#cybersecurity #entrepreneurship #pentesting

    • Bob Young on LinkedIn: #callmeifyouneedme #fifonetworks #cybersecurity #networkarchitecture (26)

    53

    10 Comments

    Like Comment

    To view or add a comment, sign in

  • Bob Young

    IT/OT Network Training, Consulting, Cybersecurity | “IT by the hour” for small business and SOHO | Data and account recovery when a loved one dies | Cybersecurity - Networks - Wireless – Telecom – VoIP | Nationwide

    • Report this post

    If you use Square credit card processing, beware of fake emails being sent right now.Cybercriminals are actively using a fake domain to send emails. The malicious emails are from:squareup(dot)netThe real Square domain is:squareup(dot)comI received the email shown in the screenshot on July 30. All links in the email are disguised with a link shortener. Don’t click! Mark the email as spam/phishing/junk and delete.Interesting sidenote: I get my work emails in Outlook, but also via Gmail. Gmail flagged the message, but Microsoft Outlook let it right on through.#callmeifyouneedme #fifonetworks#cybersecurity #phishing #email

    • Bob Young on LinkedIn: #callmeifyouneedme #fifonetworks #cybersecurity #networkarchitecture (31)

    18

    3 Comments

    Like Comment

    To view or add a comment, sign in

  • Bob Young

    IT/OT Network Training, Consulting, Cybersecurity | “IT by the hour” for small business and SOHO | Data and account recovery when a loved one dies | Cybersecurity - Networks - Wireless – Telecom – VoIP | Nationwide

    • Report this post

    True problem analysts do not like default solutions. Every solution to every problem needs to be independently derived. Underlying principles stand firm, but the methodologies and solutions are always in flux. “Bob, what are you talking about?”Well, here’s an example. A default solution to a wide array of problems today is, “We’ll spin up another VM in our cloud account.”Stop. Analyze. Is the data appropriate for an Internet-accessible environment? What are the security requirements? Is that VM going to generate revenue, or save money, or… is it just an expense? Will the data be backed up? Will the environment be backed up? How does that affect the cost analysis?Yesterday’s solution isn’t necessarily today’s solution. Work it out, each time, as a new problem – because it is.#callmeifyouneedme #fifonetworks#cybersecurity #networkarchitecture #systems #budget

    13

    10 Comments

    Like Comment

    To view or add a comment, sign in

  • Bob Young

    IT/OT Network Training, Consulting, Cybersecurity | “IT by the hour” for small business and SOHO | Data and account recovery when a loved one dies | Cybersecurity - Networks - Wireless – Telecom – VoIP | Nationwide

    • Report this post

    It was like playing Whac-A-Mole. Saturday evening I was doing month-end maintenance for one of my clients, and a firewall alert came up for a denied VPN connection. I glanced at it, and it was for “Eric.” But there’s no one in the VPN group named Eric! I checked the source IP address, and it was registered through RIPE NCC, which is the Regional Internet Registry for Europe, Middle East, and Central Asia.This particular client has no regular business dealings with anyone outside the USA, so I blocked the whole Class A address range. I went back to work, and about ten minutes later… “Eric” pops up again, from a different IP address, also registered through RIPE. I blocked that whole Class A range, too.A few minutes later… yup. But this time, it’s a different name, so I don’t know if it’s the same person or not. Again, the address is registered through RIPE, so I blocked the whole Class A range.And, a few minutes more… another attempted VPN login was blocked. A different name was used, and a different IP address. This time, it was from a Class B address range registered in the USA to Alibaba. I blocked that whole range, too. If my client buys stuff from Alibaba, I may hear about this one in a few days. If that’s the case, I’ll open the range and block the single IP address used by the attacker.Things settled down after that. This client sometimes goes months without a VPN attempt in the logfile.THE LESSONS(Q) “If the firewall blocked the failed login attempt, why block the IP addresses? After all, the attack was thwarted anyway.”(A) Because it’s never just one attempt. The cybercriminal will keep trying various combinations.(Q) “Why block an address range, instead of just blocking the attacker’s IP address?”(A) Because the attacker may have access to multiple endpoints from which to launch the attack, and those endpoints may have certain commonalities, like all being with the same ISP.(Q) "Why not just block entire countries and be done with it?"(A) For some clients, I do exactly that. It depends on the client’s security needs. Some of the Internet resources people want aren’t located in their country, so blocking entire countries or continents may be viewed as inconvenient.#callmeifyouneedme #fifonetworks#cybersecurity #firewall #vpn #iam

    • Bob Young on LinkedIn: #callmeifyouneedme #fifonetworks #cybersecurity #networkarchitecture (40)

    32

    10 Comments

    Like Comment

    To view or add a comment, sign in

  • Bob Young

    IT/OT Network Training, Consulting, Cybersecurity | “IT by the hour” for small business and SOHO | Data and account recovery when a loved one dies | Cybersecurity - Networks - Wireless – Telecom – VoIP | Nationwide

    • Report this post

    Yesterday at the weekly Rotary lunch one of the other members asked me about the CrowdStrike incident. I realized that he thought it was caused by cybercriminals, so I said, “It wasn’t caused by a virus.” His eyes opened wide and he asked what happened, so I explained that it was a piece of badly written code that was part of an update issued by CrowdStrike. He correctly concluded, “So they didn’t even test it before it went out.” I nodded and he said, “I hope they learned a lesson.”The reason this conversation is noteworthy is because this affluent, well-educated man still didn’t understand what happened after a week of reporting in the news.I see two issues that need to be addressed: 1) Journalists need to have a better grasp of cybersecurity incidents so they can provide better quality information, and2) The general public needs more training in both information technology and cybersecurity awareness.#callmeifyouneedme #fifonetworks#cybersecurity #informationtechnology

    • Bob Young on LinkedIn: #callmeifyouneedme #fifonetworks #cybersecurity #networkarchitecture (45)

    196

    33 Comments

    Like Comment

    To view or add a comment, sign in

Bob Young on LinkedIn: #callmeifyouneedme #fifonetworks #cybersecurity #networkarchitecture (49)

Bob Young on LinkedIn: #callmeifyouneedme #fifonetworks #cybersecurity #networkarchitecture (50)

7,044 followers

  • 2,252 Posts
  • 41 Articles

View Profile

Follow

More from this author

  • The A Priori Assumptions of Modern Information Systems Architecture Bob Young 4w
  • VPNs Don’t Hide Your Location Bob Young 3mo
  • Identifying the Real Problem Bob Young 4mo

Explore topics

  • Sales
  • Marketing
  • Business Administration
  • HR Management
  • Content Management
  • Engineering
  • Soft Skills
  • See All
Bob Young on LinkedIn: #callmeifyouneedme #fifonetworks #cybersecurity #networkarchitecture (2024)
Top Articles
25 Authentic Filipino Recipes for All Occasions [Filipino Food for Beginners]
Master bathroom ideas – 21 designs to help you relax and soak in style
Spasa Parish
Rentals for rent in Maastricht
159R Bus Schedule Pdf
Sallisaw Bin Store
Black Adam Showtimes Near Maya Cinemas Delano
Espn Transfer Portal Basketball
Pollen Levels Richmond
11 Best Sites Like The Chive For Funny Pictures and Memes
Things to do in Wichita Falls on weekends 12-15 September
Craigslist Pets Huntsville Alabama
Paulette Goddard | American Actress, Modern Times, Charlie Chaplin
What's the Difference Between Halal and Haram Meat & Food?
R/Skinwalker
Rugged Gentleman Barber Shop Martinsburg Wv
Jennifer Lenzini Leaving Ktiv
Ems Isd Skyward Family Access
Elektrische Arbeit W (Kilowattstunden kWh Strompreis Berechnen Berechnung)
Omni Id Portal Waconia
Kellifans.com
Banned in NYC: Airbnb One Year Later
Four-Legged Friday: Meet Tuscaloosa's Adoptable All-Stars Cub & Pickle
Model Center Jasmin
Ice Dodo Unblocked 76
Is Slatt Offensive
Labcorp Locations Near Me
Storm Prediction Center Convective Outlook
Experience the Convenience of Po Box 790010 St Louis Mo
Fungal Symbiote Terraria
modelo julia - PLAYBOARD
Poker News Views Gossip
Abby's Caribbean Cafe
Joanna Gaines Reveals Who Bought the 'Fixer Upper' Lake House and Her Favorite Features of the Milestone Project
Tri-State Dog Racing Results
Navy Qrs Supervisor Answers
Trade Chart Dave Richard
Lincoln Financial Field Section 110
Free Stuff Craigslist Roanoke Va
Stellaris Resolution
Wi Dept Of Regulation & Licensing
Pick N Pull Near Me [Locator Map + Guide + FAQ]
Crystal Westbrooks Nipple
Ice Hockey Dboard
Über 60 Prozent Rabatt auf E-Bikes: Aldi reduziert sämtliche Pedelecs stark im Preis - nur noch für kurze Zeit
Wie blocke ich einen Bot aus Boardman/USA - sellerforum.de
Infinity Pool Showtimes Near Maya Cinemas Bakersfield
Dermpathdiagnostics Com Pay Invoice
How To Use Price Chopper Points At Quiktrip
Maria Butina Bikini
Busted Newspaper Zapata Tx
Latest Posts
Article information

Author: Greg Kuvalis

Last Updated:

Views: 5823

Rating: 4.4 / 5 (75 voted)

Reviews: 90% of readers found this page helpful

Author information

Name: Greg Kuvalis

Birthday: 1996-12-20

Address: 53157 Trantow Inlet, Townemouth, FL 92564-0267

Phone: +68218650356656

Job: IT Representative

Hobby: Knitting, Amateur radio, Skiing, Running, Mountain biking, Slacklining, Electronics

Introduction: My name is Greg Kuvalis, I am a witty, spotless, beautiful, charming, delightful, thankful, beautiful person who loves writing and wants to share my knowledge and understanding with you.