Monthly Archives: June 2015


Balancing Security And Customer Satisfaction

For those of us who perform any functions in cybersecurity, you know how much of a challenge it can be to strike a balance between needed levels of security and a happy customer base. The two are often at odds, considering that they are usually diametrically opposed. The CISO and his minions seek the utmost in security. Constantly changing passwords of a high complexity. Locked down VPN capabilities. Stringent standards for wireless networks. Strictly restricted device lists, in terms of [...]

Layer 8 Security Providing Insights to Local Manufacturers

PRESS RELEASE Contact: Casey Lipson, Sales and Marketing Coordinator June 24, 2015 Exton, Pennsylvania - Kevin Hyde, Managing Director of Layer 8 Security, participated as a cybersecurity expert panelist at the Lower Bucks County Chamber of Commerce's Manufacturing Alliance Forum on June 18, 2015 at the Keystone Industrial Park in Fairless Hills, PA. Attendees learned about current and upcoming trends in the manufacturing industry from expert panelists regarding employee training practices, financing, and cybersecurity. "Manufacturing is one of our [...]

Could IPv6 Be A Boon For DDoS Attackers?

In my eyes, IPv6 is today what VoIP was in the early 2000's-that is, a protocol which, while it carries great promise, takes forever to gain critical mass. I recall many years where vendors would declare that "this was the year VoIP breaks out", only to hear it again from them a year later. IPv6 has been around for quite some time-I myself worked on government agency projects to make them IPv6 compliant back in 2009, and even today, IPv6 [...]

Internet of Things presents new challenges

It is, without a doubt, one of the hottest topics in IT. The Internet of Things, or how data networking is going to effectively connect everything to everyone, has been discussed for quite some time, but it was not until recently where current technology was able to catch up to the theoretical ideas that have been out there. Now, we are seeing an explosion in embedded devices-things we would not have previously expected to have connectivity do. And this can [...]

IoT can help manufacturing, but does it make you less secure?

When companies began to embrace the idea and the tech behind the Internet of Things (IoT), one area that stood to benefit the most was, and is, the world of manufacturing. Anyplace that relies on efficient operations to keep things flowing, and does so using a litany of systems, lends itself well to the burgeoning world of IoT. Imagine if all of your numerous systems are becoming much more easy to network and thus control online-it would be a godsend [...]

Understanding the legal repercussions of our cyber actions: Prosecutor invokes Sarbanes Oxley Act in accusing witness of obstruction of justice by deleting browser history

Every decision we make, every action or inaction, has the potential to harm individuals, employees, and their companies. When scanning media outlets, we are constantly inundated with breaking news about the next breach or the most recent corporate cyber blunder. Staying abreast of this ever changing landscape is critical for business executives. Layer 8 Security can keep you ahead of the curve. Interestingly, here is an article discussing an intentional deletion of a browser cache intended to hide someone's obstruction [...]

Secure Your SOHO Wireless Routers

This is another one of those things that, for the vast majority of IT professionals, ought to be second nature. When you get something new, with a default username and change it. It's always my first order of business, next to changing the default IP addresses. Locking down any new network gear is imperative, because with user guides online, anyone can figure out the default access information. Need further proof of how bad being lazy can be, or added [...]

From Cybersecurity to Scholarships: Giving Back

PRESS RELEASE Contact: Casey Lipson, Sales and Marketing Coordinator June 8, 2015 Exton, Pennsylvania - Jeffrey Lipson, Executive Director of Layer 8 Security, attended the Blue White Scholarship Foundation's tailgate at the Radnor Hunt Club on Saturday, May 16th. "Supporting the Blue White Scholarship Foundation is our way of giving back to the Villanova University community - having graduated from Villanova, I'm especially happy to be able to contribute to these students' success. Layer 8 Security is proud to [...]

Next Steps In Password Security

It used to be that you had one or two passwords. They rarely, if ever changed. You may have even had it written down on a Post-It note, placed securely next to the very PC it protected. Nowadays? Even if you are not a sysadmin, odds are you have half a dozen (or more) accounts and passwords, covering everything from e-mail to Facebook to online banking and trading accounts.  Odds are, you have a file somewhere to keep track of [...]