Troubleshooting a Spotty/Bad Internet Connection (by Chris Greer)

Recently, I changed my internet service to a new provider. These guys promised some decent bandwidth at a good price.

After getting it installed, nerd-proofed, and monitored, all looked good.

That is until I had a remote training class to teach over WebEx – then the audio issues began. (Of course! Why do these issues always KNOW?!?! Right when you need the connection the most – boom!)

Every 10-15 minutes or so the audio would drop for about 5 seconds. The students could still see my screen, but the audio was clearly having issues. Fortunately, I could call in using my cell and finish up the class with no further problems.

As much as I wanted to blame WebEx, I knew that it was no small coincidence that I had just changed my internet service. Alas, this time it looked like it really was the network! Time to crack out the tools and troubleshoot.

Packet Capture - Wireshark

Continue reading "Troubleshooting a Spotty/Bad Internet Connection (by Chris Greer)" »


Your Website - Effective Link Building Strategies for 2018 (by Rana Tarakji)

Your Website - Effective Link Building Strategies for 2018

Link building is one of the most widely used off-site SEO strategy. Basically, it makes use of links that direct people to your website to gain authority and rank higher in search engine result pages.

Although algorithms of search engine platforms can be quite unpredictable, the use of link building remains effectively relevant as it makes use of the main pathways that search engine spiders crawl on – links.

There are many link building techniques used by website owners and digital marketing companies that provide SEO services, here are a few that are still effective this 2018:

  • Reaching out. Learning about where your brand or your company is mentioned online, as well as contacting the people who have done so or may possibly do so, is a seemingly tedious task, but it comes with benefits. Aside from being able to check if there are backlinks to your website, upon mention of your company or product’s brand, you also get the chance to verify if the links are accurate, up-to-date, and correctly in place. Also, this gives your company a chance to interact with blog managers or people in your industry that discuss topics related to your niche. Most importantly, this helps you assert your authority in the field not only through increased links but also with your proactive interaction.
  • Socializing and increasing visibility online. Connections through social media platforms continue to widen as more people become savvy with their online presence. Responding to this boom in online activity is a logical way to establish relevance by creating visually-appealing (i.e. infographics) and engaging content. Nothing tells search engine bots that your site and content are relevant enough than by making sure your reach translates to numerous links of online shares.
  • Creating valuable content. Users search online to gather information and prefer those that come from credible sources. The same is the rationale behind ranking websites – to point people to the direction of trustworthy With content that contains original and reliable data acquired through comprehensive research, gaining backlinks to your site will be effortless because users will always link back and associate themselves high quality content.

Region CaptureAuthor : Rana Tarakji is an entrepreneur and a contributing writer at One SEO, a digital marketing agency, who lives in Beirut, Lebanon. Rana Tarakji is passionate about digital marketing, startups, helping entrepreneurs grow, and empowering them to live their dreams. She has worked as a marketer, a technology co-founder and business developer, and a writer.


LMTV Live | Modern Attack Vectors – A Compounded Headache (with Andrew Vladimirov)

EVENT START TIME: 9:30 AM PST - Wednesday, September 5th, 2018

This week we will be talking with Andrew Vladimirov of Arhont Information Security, about the new tricks hackers are using to get their hands on your data and do other nasty things.

Before you implement counter information security measures, do you know what you are protecting against? Do you understand the actual risks your business faces and the attacker strategies that are used?

Determined and skilled hackers employ a combination of social engineering and technical (client/server/application/database/all 7 OSI layers network) attack means which interchange subject to how events unfold and where the next available gap can be found. Until you fully understand how an attacker approaches work in combination of these methods and how these create compounded risks, you will continue building virtual Maginot lines and gasping at being outflanked yet another time. 

In this LMTV session we will discuss the how hackers combining social engineering and technical attacks, make the most devastating and difficult to protect against today.  We will suggest ways you should start planning against these.


Mapping Network Security Resilience To The NIST Cybersecurity Framework (by Keith Bromley)

Mapping Network Security Resilience To The NIST Cybersecurity Framework!

On May 11, 2017 President Trump issued his Presidential Executive Order 13800. As part of this executive order, all government agency heads will be held accountable for implementing solutions and managing the risks associated with threats to our nation’s cybersecurity and thus must take immediate action to review cybersecurity protocols in order to upgrade each department’s IT infrastructure. Furthermore, the executive order mandates the use of the NIST Framework for Improving Critical Infrastructure Cybersecurity within government agencies.

The NIST Framework for Improving Critical Infrastructure Cybersecurity provides a common language for understanding, managing, and expressing cybersecurity risk. This framework is built upon concepts to organize information, enable risk management decisions, address threats, and improve through lessons learned.

The foundation to these concepts are aligned within five core functions:

  • Identify
  • Protect
  • Detect
  • Respond
  • Recover

A new whitepaper from Ixia (a Keysight Business) called Deploying a Layered Visibility and Cybersecurity Architecture provides an overview of how to combine a visibility architecture with a security architecture to address the NIST architecture. The following excerpt provides a short of overview of how to accomplish this. A full discussion on the subject is contained within the whitepaper.

Review the foundation concepts - Framework-01

Continue reading "Mapping Network Security Resilience To The NIST Cybersecurity Framework (by Keith Bromley)" »


Mercury Reader For When you Need To Read (by Tony Fortunato)

I find myself constantly reading, referencing and searching for information for all sorts of reasons.

It can get difficult to focus on the information when you have advertisements blinking and videos playing. Then then are those websites that provide good information but their download button downloads the entire document, not just the article you were reading.

This is where Mercury Reader comes in. This is a free Chrome extension that will render and reformat the page in a much easier to read format.

In this video I cover what happens if you try to use Mercury Reader on a page that does not have an article on it as well as when it works well. As I mentioned in the video, double check that Mercury Reader gets everything the first time you use it. After you render the page, you can print to your printers or to PDF if you want to save it for later reference.

Continue reading " Mercury Reader For When you Need To Read (by Tony Fortunato)" »