Go to https://giveaway.thetechfirm.com for rules and to submit your ballot or ballots ;)
Quite a few people weren't followers or on the email list, so double check.
Draw date is May 1, 2026
Quite a few people weren't followers or on the email list, so double check.
Draw date is May 1, 2026
I have done countless videos about how important it is to supervise and check on your cabling contractors.
In this example, the team and I are wondering why the contractor decided to route this cable up into the ceiling and hang the drops. Yes, we provided specific install instructions...
There will be no projector or access point here. Its a break room and we wanted a few drops for a phone, smart TV and 2 extras.
At its core, the article emphasizes a layered security approach across the management, control, and data planes. That means locking down access with AAA, disabling unused services, enforcing strong password policies, and ensuring secure management protocols like SSHv2 are used instead of legacy options. These best practices align with long-standing Cisco hardening guidance, which highlights securing access, encrypting communications, and limiting exposure as foundational defenses .
The guide also digs into service and protocol hardening—one of the most overlooked areas. This includes disabling insecure protocols (like Telnet or older TLS versions), tightening SNMP configurations, and removing weak cryptographic ciphers. Even seemingly minor misconfigurations—like leaving outdated SSH settings enabled—can create major attack surfaces, making it critical to modernize crypto settings and keep IOS XE versions up to date .
Finally, the article reinforces the importance of continuous monitoring and maintenance. Hardening isn’t a “set it and forget it” task—it requires regular audits, log analysis, patching, and reviewing Cisco security advisories. With new vulnerabilities surfacing regularly, staying proactive ensures your network devices remain resilient, not just configured securely on day one.
Click here or the image above to read the full article
Even though the bulk of the installations were done around the same time period with some really good installation standards like what goes to what port, IP addressing standards, etc.. things change over the years for a multitude of reasons:
- replacing equipment due to upgrades or failure