Author Archives: Mylon Staton

Improving Cell Coverage in LEED-Certified Buildings

Unless you are in the building and construction industry, you may not be familiar with LEED Building Certifications. LEED stands for Leadership in Energy and Environmental Design.

Since its launch in 2000, LEED standards have been adopted and incorporated into almost every type of building structure, from the smallest of homes to the largest of commercial buildings, and everything in-between. 

Continue reading

Growing Use of AI Expected to Close IT Security Gap

A recent study by The Ponemon Institute, sponsored by Aruba Networks, revealed growing reliance on Artificial Intelligence technologies for detecting and stopping attacks that target users and IoT devices.

For the study 4,000 security and IT professionals were surveyed across the Americas, Europe and Asia to understand what makes security deficiencies so hard to fix, and what types of technologies and processes are needed to stay a step ahead of bad actors within the new threat landscape. Continue reading

Compliance Gap Analysis Pays Off

Organizations without a Chief Information Security Officer (CISO) or an IT Security Manager typically lack a comprehensive plan to address security issues mandated by government agencies and industry best practices.

Achieving compliance requires focus and expertise. It requires drilling down to the standards and laws that impact your organization, understanding security controls, implementing needed safeguards, and meeting reporting deadlines.

Continue reading

Do I Really Need a Firewall?

Akamai Technologies has detected malware that alters configurations on small business routers to open connections to internal networks so hackers can infect previously isolated computers.

Hackers achieve this with a technique known as UPnProxy, which exploits vulnerabilities in the UPnP services installed on older routers to alter the Network Address Translation (NAT) tables. Continue reading

What Are You Doing to Protect Your Data?

The world’s largest hotel operator, Marriott International, suffered a massive security breach last month that exposed the reservation details of up to 500 million customers. The information stolen included guest names, addresses, credit card numbers, phone numbers, and passport numbers.

As a result of the data breach, Marriott faces class action lawsuits, regulatory fines and government investigations from jurisdictions worldwide. When all is said and done, the company could face damages that run into the billions of dollars. Continue reading

Nailing the Landing for Sky Zone Trampoline Park

DataLink client Sky Zone was first on the scene when it created the world’s first wall-to-wall trampoline park in 2004.  Since then they’ve been growing rapidly – bringing healthy, high-flying fun to people across our region, the country and the globe.

We’re proud to be part of their rapid expansion here in the States.  We stage, deploy and test each new Sky Zone park’s IT, Audio & Visual environment – enabling their innovative approach to fitness, entertainment, and interactive technology.
Continue reading

Protect Your Business Against Email Attacks

According to the SANS Institute, email attacks are increasing dramatically, with spear phishing now one of the most common types, right along with ransomware. In the case of spear phishing attacks, cyber criminals carry out extensive social engineering activities to gather personal information and craft messages that appear from trusted sources to gain the victim’s confidence. Continue reading

Stay Connected When the Snow Hits

Providing employees with the ability to work remotely – with full access to their desktop voice and data and applications – has become an essential element of business continuity, especially in our area, where a winter snow blast can suddenly force streets and buildings to close, potentially putting your business on hold.

Continue reading

How the Cloud Simplifies Multi-Site IT Management

The basic idea behind centralized computing is to permit multi-site enterprises to run their IT operations without the complexity and expense associated with running traditional data centers and infrastructure, while also supporting distributed users.

Instead, they can rely on service providers like DataLink to fulfill their processing, storage, server, networking and support needs. Continue reading