<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>TBL Networks</title>
	<atom:link href="http://www.theblinkylight.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.theblinkylight.com/</link>
	<description>Technology. Redefined.</description>
	<lastBuildDate>Mon, 14 Apr 2025 16:40:14 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>http://www.theblinkylight.com/wp-content/uploads/2018/04/favicon.png</url>
	<title>TBL Networks</title>
	<link>https://www.theblinkylight.com/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>TBL Networks’ Guide to Protecting Financial Data with Cisco Umbrella</title>
		<link>http://www.theblinkylight.com/protecting-financial-data-cisco-umbrella/</link>
					<comments>http://www.theblinkylight.com/protecting-financial-data-cisco-umbrella/#respond</comments>
		
		<dc:creator><![CDATA[TBL Networks]]></dc:creator>
		<pubDate>Wed, 14 Aug 2024 13:58:47 +0000</pubDate>
				<category><![CDATA[Insights]]></category>
		<guid isPermaLink="false">https://www.theblinkylight.com/?p=5153</guid>

					<description><![CDATA[<p>Financial data breaches are not just a possibility but a common occurrence, the importance of [&#8230;]</p>
<p>The post <a href="http://www.theblinkylight.com/protecting-financial-data-cisco-umbrella/">TBL Networks’ Guide to Protecting Financial Data with Cisco Umbrella</a> appeared first on <a href="http://www.theblinkylight.com">TBL Networks</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">Financial data breaches are not just a possibility but a common occurrence, the importance of robust financial data security cannot be overstated. For IT professionals in leadership roles, safeguarding this sensitive data is paramount. This guide introduces TBL Networks&#8217; approach to leveraging </span><a href="https://umbrella.cisco.com/"><span style="font-weight: 400;">Cisco Umbrella f</span></a><span style="font-weight: 400;">or unparalleled protection of financial data.</span><br />
<span id="more-5153"></span></p>
<h2>Understanding Financial Data Vulnerabilities</h2>
<p><span style="font-weight: 400;">Financial institutions are uniquely exposed to a variety of cyber threats, with the</span><a href="https://www.verizon.com/business/resources/T455/reports/2023-data-breach-investigations-report-dbir.pdf"><span style="font-weight: 400;"> Verizon Data Breach Investigations Report (DBIR) </span></a><span style="font-weight: 400;">for 2023 shedding light on the specific vulnerabilities within this sector:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;"><strong>Prevalent Threats:</strong> The financial sector is primarily threatened by Basic Web Application Attacks, Miscellaneous Errors, and System Intrusion, together accounting for 77% of breaches.</span>
<ul>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Basic Web Application Attacks indicate that adversaries can gain access with relatively minimal effort, highlighting the need for robust web application security measures.</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Miscellaneous Errors, including Misdelivery, suggest that human error remains a significant </span><span style="font-weight: 400;"><br />
</span><span style="font-weight: 400;">vulnerability, underscoring the importance of thorough training and procedural checks.</span></li>
</ul>
</li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;"><strong>Threat Actors:</strong> The majority of breaches (66%) are perpetrated by external actors, although a substantial 34% involve internal parties, indicating the need for both perimeter and insider threat defenses.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;"><strong>Motivations:</strong> Financial gain is the primary driver behind 97% of incidents, emphasizing the need for financial institutions to protect against profit-motivated cybercriminals.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Compromised Data: Personal information is the most frequently compromised type of data (74%), followed by credentials (38%), making identity theft and credential misuse major concerns.</span></li>
</ul>
<p><span style="font-weight: 400;">Given these insights, financial institutions should consider a comprehensive cybersecurity solution that addresses these specific vulnerabilities to effectively shield themselves against these threats.</span></p>
<p><img fetchpriority="high" decoding="async" class="alignnone wp-image-5155 size-full" src="https://www.theblinkylight.com/wp-content/uploads/2024/02/blog-image-1.jpeg" alt="" width="1200" height="400" srcset="http://www.theblinkylight.com/wp-content/uploads/2024/02/blog-image-1.jpeg 1200w, http://www.theblinkylight.com/wp-content/uploads/2024/02/blog-image-1-300x100.jpeg 300w, http://www.theblinkylight.com/wp-content/uploads/2024/02/blog-image-1-1024x341.jpeg 1024w, http://www.theblinkylight.com/wp-content/uploads/2024/02/blog-image-1-768x256.jpeg 768w" sizes="(max-width: 1200px) 100vw, 1200px" /></p>
<h2>The Role of Cisco Umbrella in Data Protection</h2>
<p><span style="font-weight: 400;">Cisco Umbrella acts as the first line of defense against threats on the internet, providing an effective security layer that blocks malicious activity before it reaches your network or endpoints. By leveraging the internet’s infrastructure to block malicious destinations before a connection is established, Cisco Umbrella provides a powerful shield for financial data.</span></p>
<h2>Key Features of Cisco Umbrella for Protecting Financial Data</h2>
<p><span style="font-weight: 400;">Cisco Umbrella offers a</span><a href="https://umbrella.cisco.com/blog/cisco-umbrella-delivered-better-cybersecurity-231-percent-roi"><span style="font-weight: 400;"> robust cybersecurity solution</span></a><span style="font-weight: 400;">. Features are tailored for the financial sector and include: </span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;"><strong>DNS-Layer Security:</strong> Filters DNS requests to block access to malicious domains and IPs.</span>
<ul>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Prevents data exfiltration: Blocks attempts to steal data via DNS.</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Global network: Leverages Cisco&#8217;s worldwide data centers for fast and reliable threat enforcement.</span></li>
</ul>
</li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;"><strong>Secure Web Gateway:</strong> Provides deep visibility into internet activity and enforces security policies.</span>
<ul>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Advanced threat defense: Integrates with antivirus and sandboxing technologies.</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">SSL decryption: Inspects encrypted traffic for hidden threats.</span></li>
</ul>
</li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;"><strong>Cloud-Delivered Firewall:</strong> Manages and blocks traffic using comprehensive rules.</span>
<ul>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Application visibility and control: Identifies and controls application use across the network.</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Seamless policy enforcement: Applies consistent security policies across all users and locations.</span></li>
</ul>
</li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;"><strong>Cloud Access Security Broker (CASB):</strong> Offers insights and control over cloud application use.</span>
<ul>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Shadow IT detection: Identifies and manages unsanctioned cloud app usage.</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Data loss prevention: Monitors and protects sensitive information in the cloud.</span></li>
</ul>
</li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;"><strong>Threat Intelligence:</strong> Powered by Cisco Talos for extensive threat detection.</span>
<ul>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Real-time updates: Continuously updated to respond to emerging threats.</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Broad visibility: Monitors a vast array of internet infrastructure for comprehensive coverage.</span></li>
</ul>
</li>
</ul>
<p><span style="font-weight: 400;">These features collectively safeguard financial institutions against a wide spectrum of cyber threats, ensuring the protection of sensitive data and the continuity of financial services.</span></p>
<h2>Best Practices for Financial Data Security</h2>
<p><span style="font-weight: 400;">Implementing Cisco </span><a href="https://www.theblinkylight.com/the-security-baselines-the-best-places-to-invest-when-you-cant-have-it-all/"><span style="font-weight: 400;">Umbrella </span></a><span style="font-weight: 400;">involves assessing your current security posture, integrating the solution with existing security systems, and ensuring staff are trained and aware of the new protocols. A phased approach, starting with critical assets, ensures a smooth transition.</span></p>
<p><span style="font-weight: 400;">To complement Cisco Umbrella, IT leaders should enforce regular updates and patch management, implement strong access controls and authentication measures, and establish continuous monitoring and incident response protocols. These practices form a comprehensive defense strategy.</span></p>
<h2><img decoding="async" class="alignnone size-full wp-image-5156" src="https://www.theblinkylight.com/wp-content/uploads/2024/02/blog-image-2.jpeg" alt="" width="1200" height="400" srcset="http://www.theblinkylight.com/wp-content/uploads/2024/02/blog-image-2.jpeg 1200w, http://www.theblinkylight.com/wp-content/uploads/2024/02/blog-image-2-300x100.jpeg 300w, http://www.theblinkylight.com/wp-content/uploads/2024/02/blog-image-2-1024x341.jpeg 1024w, http://www.theblinkylight.com/wp-content/uploads/2024/02/blog-image-2-768x256.jpeg 768w" sizes="(max-width: 1200px) 100vw, 1200px" /></h2>
<h2>Fortify Your Cybersecurity with TBL Networks</h2>
<p><span style="font-weight: 400;">In the ever-evolving landscape of cyber threats, financial institutions require a reliable partner to enhance their defenses. </span><a href="https://www.theblinkylight.com/about-us/"><span style="font-weight: 400;">TBL Networks</span></a><span style="font-weight: 400;"> emerges as a leading figure in cybersecurity expertise, offering unparalleled services to protect against digital threats. Their approach is characterized by a deep understanding of the cybersecurity challenges faced by financial institutions and a commitment to providing tailored solutions.</span></p>
<p><span style="font-weight: 400;">TBL Networks stands as a trusted ally for financial institutions, offering a combination of advanced cybersecurity expertise and a commitment to client education. Their proactive, knowledgeable, and user-centric approach makes them an ideal partner for navigating the complexities of digital security in the financial sector.</span></p>
<h2>Start Your Umbrella Free Trial with TBL Networks</h2>
<p><span style="font-weight: 400;">For financial institutions looking to bolster their data security, Cisco Umbrella presents a compelling solution. To explore how TBL Networks can assist in implementing Cisco Umbrella and transforming your security landscape, reach out for a </span><a href="https://www.theblinkylight.com/contact/"><span style="font-weight: 400;">consultation </span></a><span style="font-weight: 400;">or to start a free trial.</span></p>
<p style="text-align: center;"><a href="https://www.theblinkylight.com/secure-network-free-trial/"><img decoding="async" class="aligncenter wp-image-5166 size-full" src="http://www.theblinkylight.com/wp-content/uploads/2024/03/TBL-Umbrella-CTA.png" alt="cisco-umbrella-trial" width="3531" height="1250" srcset="http://www.theblinkylight.com/wp-content/uploads/2024/03/TBL-Umbrella-CTA.png 3531w, http://www.theblinkylight.com/wp-content/uploads/2024/03/TBL-Umbrella-CTA-300x106.png 300w, http://www.theblinkylight.com/wp-content/uploads/2024/03/TBL-Umbrella-CTA-1024x363.png 1024w, http://www.theblinkylight.com/wp-content/uploads/2024/03/TBL-Umbrella-CTA-768x272.png 768w, http://www.theblinkylight.com/wp-content/uploads/2024/03/TBL-Umbrella-CTA-1536x544.png 1536w, http://www.theblinkylight.com/wp-content/uploads/2024/03/TBL-Umbrella-CTA-2048x725.png 2048w" sizes="(max-width: 3531px) 100vw, 3531px" /></a></p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=http%3A%2F%2Fwww.theblinkylight.com%2Fprotecting-financial-data-cisco-umbrella%2F&amp;linkname=TBL%20Networks%E2%80%99%20Guide%20to%20Protecting%20Financial%20Data%20with%20Cisco%20Umbrella" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_mastodon" href="https://www.addtoany.com/add_to/mastodon?linkurl=http%3A%2F%2Fwww.theblinkylight.com%2Fprotecting-financial-data-cisco-umbrella%2F&amp;linkname=TBL%20Networks%E2%80%99%20Guide%20to%20Protecting%20Financial%20Data%20with%20Cisco%20Umbrella" title="Mastodon" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=http%3A%2F%2Fwww.theblinkylight.com%2Fprotecting-financial-data-cisco-umbrella%2F&amp;linkname=TBL%20Networks%E2%80%99%20Guide%20to%20Protecting%20Financial%20Data%20with%20Cisco%20Umbrella" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=http%3A%2F%2Fwww.theblinkylight.com%2Fprotecting-financial-data-cisco-umbrella%2F&#038;title=TBL%20Networks%E2%80%99%20Guide%20to%20Protecting%20Financial%20Data%20with%20Cisco%20Umbrella" data-a2a-url="http://www.theblinkylight.com/protecting-financial-data-cisco-umbrella/" data-a2a-title="TBL Networks’ Guide to Protecting Financial Data with Cisco Umbrella"></a></p><p>The post <a href="http://www.theblinkylight.com/protecting-financial-data-cisco-umbrella/">TBL Networks’ Guide to Protecting Financial Data with Cisco Umbrella</a> appeared first on <a href="http://www.theblinkylight.com">TBL Networks</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://www.theblinkylight.com/protecting-financial-data-cisco-umbrella/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Elevating Financial Cybersecurity: Harnessing the Cisco Duo Edge</title>
		<link>http://www.theblinkylight.com/elevating-financial-cybersecurity-cisco-duo/</link>
					<comments>http://www.theblinkylight.com/elevating-financial-cybersecurity-cisco-duo/#respond</comments>
		
		<dc:creator><![CDATA[TBL Networks]]></dc:creator>
		<pubDate>Mon, 08 Jul 2024 17:36:05 +0000</pubDate>
				<category><![CDATA[Insights]]></category>
		<category><![CDATA[cisco]]></category>
		<category><![CDATA[Cisco Duo]]></category>
		<guid isPermaLink="false">https://www.theblinkylight.com/?p=5221</guid>

					<description><![CDATA[<p>In an era where digital footprints are as valuable as physical assets, the financial sector [&#8230;]</p>
<p>The post <a href="http://www.theblinkylight.com/elevating-financial-cybersecurity-cisco-duo/">Elevating Financial Cybersecurity: Harnessing the Cisco Duo Edge</a> appeared first on <a href="http://www.theblinkylight.com">TBL Networks</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In an era where digital footprints are as valuable as physical assets, the financial sector stands at a pivotal crossroads. The increase in cyber threats targeting financial institutions isn&#8217;t just a statistic; it&#8217;s a pressing reality demanding sophisticated defenses. At TBL Networks, we don&#8217;t just observe these changes; we lead the charge in combating them, deploying advanced solutions like Cisco Duo to fortify our client&#8217;s defenses.<br />
<span id="more-5221"></span></p>
<h2>The Imperative for Stronger Cybersecurity</h2>
<p>Imagine the financial sector as a vast, interconnected web, pulsing with transactions that drive global economies. Here, data isn&#8217;t just currency—it&#8217;s the cornerstone of trust and stability. As cyber threats evolve in complexity and cunning, the need for robust cybersecurity measures becomes more urgent. It’s no longer a question of if a financial institution will be targeted, but when.</p>
<p><img loading="lazy" decoding="async" class="wp-image-5222 size-full aligncenter" src="https://www.theblinkylight.com/wp-content/uploads/2024/05/bank-hacker-tbl-min.jpg" alt="" width="1200" height="400" srcset="http://www.theblinkylight.com/wp-content/uploads/2024/05/bank-hacker-tbl-min.jpg 1200w, http://www.theblinkylight.com/wp-content/uploads/2024/05/bank-hacker-tbl-min-300x100.jpg 300w, http://www.theblinkylight.com/wp-content/uploads/2024/05/bank-hacker-tbl-min-1024x341.jpg 1024w, http://www.theblinkylight.com/wp-content/uploads/2024/05/bank-hacker-tbl-min-768x256.jpg 768w" sizes="(max-width: 1200px) 100vw, 1200px" /></p>
<h2>Why We Continue to Choose Cisco Duo</h2>
<p>Enter Cisco Duo, a beacon of modern cybersecurity solutions. At TBL Networks, we integrate Cisco Duo’s multi-factor authentication as a cornerstone of our cybersecurity strategy. Why? Because traditional security measures are akin to a single lock on a fortress gate. Cisco Duo adds multiple layers of verification, turning potential vulnerabilities into fortified barriers.</p>
<h2>Cisco&#8217;s Real World Impact in Enhanced Security</h2>
<p><a href="https://www.theblinkylight.com/case-study/cf-financial-corporation/">Many community banks, plagued by fragmented legacy systems, partnered with TBL Networks for a Cisco-powered IT overhaul</a>. Limelight Private Cloud as a Service standardized their infrastructure across all business lines, boosting connectivity and agility. Cisco Duo tackled security concerns, slashing unauthorized access attempts and rebuilding customer trust. By offloading IT management to TBL Networks, community bank staff can now focus on innovation and strategic growth, ensuring their long-term stability and competitiveness.</p>
<h2>Anticipating the Future of Cybersecurity</h2>
<p>Looking forward, the <a href="https://www.ey.com/en_us/ciso">landscape of cybersecurity in finance</a> is set to evolve rapidly. Innovations in AI and machine learning are not just futuristic concepts but imminent upgrades to our cybersecurity arsenals. These technologies stand ready to not only respond to threats but to predict and neutralize them before they can strike. At TBL Networks, our partnership with Cisco ensures that we remain at the vanguard of these technological advances, prepared to deploy solutions that protect our clients against tomorrow’s threats.</p>
<p>The integration of solutions like <a href="https://duo.com/solutions/financial">Cisco Duo within financial institutions</a> is not merely a trend but a strategic imperative. In this digital age, where cybersecurity threats loom large, the commitment of financial institutions to robust security measures is paramount. At TBL Networks, we are not just providers of technology; we are architects of security, champions of data integrity, and guardians of trust.</p>
<h2><img loading="lazy" decoding="async" class="wp-image-5223 size-full aligncenter" src="https://www.theblinkylight.com/wp-content/uploads/2024/05/get-cisco-duo-tbl-min.jpg" alt="" width="1200" height="400" srcset="http://www.theblinkylight.com/wp-content/uploads/2024/05/get-cisco-duo-tbl-min.jpg 1200w, http://www.theblinkylight.com/wp-content/uploads/2024/05/get-cisco-duo-tbl-min-300x100.jpg 300w, http://www.theblinkylight.com/wp-content/uploads/2024/05/get-cisco-duo-tbl-min-1024x341.jpg 1024w, http://www.theblinkylight.com/wp-content/uploads/2024/05/get-cisco-duo-tbl-min-768x256.jpg 768w" sizes="(max-width: 1200px) 100vw, 1200px" /></h2>
<h2>Our Promise is Clear</h2>
<p>TBL Networks lives by one promise: consistent and predictable outcomes you can depend on. That&#8217;s why we offer advanced cybersecurity solutions tailored to your financial institution&#8217;s unique needs.</p>
<p>Partner with us and empower your team to:</p>
<ul>
<li>Navigate the evolving financial landscape with confidence.</li>
<li>Protect your customers and rebuild trust with robust security.</li>
<li>Focus on innovation and strategic growth, knowing your IT infrastructure is secure.</li>
</ul>
<p>At TBL Networks, your success is our success. Let&#8217;s discuss how our custom solutions can ensure any financial stability and competitiveness.</p>
<h2>Start Your Umbrella Free Trial with TBL Networks</h2>
<p><span style="font-weight: 400;">For financial institutions looking to bolster their data security, Cisco Umbrella presents a compelling solution. To explore how TBL Networks can assist in implementing Cisco Umbrella and transforming your security landscape, reach out for a </span><a href="https://www.theblinkylight.com/contact/"><span style="font-weight: 400;">consultation </span></a><span style="font-weight: 400;">or to start a free trial.</span></p>
<p style="text-align: center;"><a href="https://www.theblinkylight.com/secure-access-cisco-duo/"><img loading="lazy" decoding="async" class="aligncenter wp-image-5168 size-full" src="https://www.theblinkylight.com/wp-content/uploads/2024/03/TBL-Duo-CTA.png" alt="cisco-duo-trial" width="3531" height="1250" srcset="http://www.theblinkylight.com/wp-content/uploads/2024/03/TBL-Duo-CTA.png 3531w, http://www.theblinkylight.com/wp-content/uploads/2024/03/TBL-Duo-CTA-300x106.png 300w, http://www.theblinkylight.com/wp-content/uploads/2024/03/TBL-Duo-CTA-1024x363.png 1024w, http://www.theblinkylight.com/wp-content/uploads/2024/03/TBL-Duo-CTA-768x272.png 768w, http://www.theblinkylight.com/wp-content/uploads/2024/03/TBL-Duo-CTA-1536x544.png 1536w, http://www.theblinkylight.com/wp-content/uploads/2024/03/TBL-Duo-CTA-2048x725.png 2048w" sizes="(max-width: 3531px) 100vw, 3531px" /></a></p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=http%3A%2F%2Fwww.theblinkylight.com%2Felevating-financial-cybersecurity-cisco-duo%2F&amp;linkname=Elevating%20Financial%20Cybersecurity%3A%20Harnessing%20the%20Cisco%20Duo%20Edge" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_mastodon" href="https://www.addtoany.com/add_to/mastodon?linkurl=http%3A%2F%2Fwww.theblinkylight.com%2Felevating-financial-cybersecurity-cisco-duo%2F&amp;linkname=Elevating%20Financial%20Cybersecurity%3A%20Harnessing%20the%20Cisco%20Duo%20Edge" title="Mastodon" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=http%3A%2F%2Fwww.theblinkylight.com%2Felevating-financial-cybersecurity-cisco-duo%2F&amp;linkname=Elevating%20Financial%20Cybersecurity%3A%20Harnessing%20the%20Cisco%20Duo%20Edge" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=http%3A%2F%2Fwww.theblinkylight.com%2Felevating-financial-cybersecurity-cisco-duo%2F&#038;title=Elevating%20Financial%20Cybersecurity%3A%20Harnessing%20the%20Cisco%20Duo%20Edge" data-a2a-url="http://www.theblinkylight.com/elevating-financial-cybersecurity-cisco-duo/" data-a2a-title="Elevating Financial Cybersecurity: Harnessing the Cisco Duo Edge"></a></p><p>The post <a href="http://www.theblinkylight.com/elevating-financial-cybersecurity-cisco-duo/">Elevating Financial Cybersecurity: Harnessing the Cisco Duo Edge</a> appeared first on <a href="http://www.theblinkylight.com">TBL Networks</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://www.theblinkylight.com/elevating-financial-cybersecurity-cisco-duo/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Enhancing Client Trust in Finance: Cisco Duo&#8217;s Role in Secure Transactions</title>
		<link>http://www.theblinkylight.com/cisco-duo-finance/</link>
					<comments>http://www.theblinkylight.com/cisco-duo-finance/#respond</comments>
		
		<dc:creator><![CDATA[TBL Networks]]></dc:creator>
		<pubDate>Tue, 02 Jul 2024 20:08:27 +0000</pubDate>
				<category><![CDATA[Insights]]></category>
		<category><![CDATA[cisco]]></category>
		<category><![CDATA[Cisco Duo]]></category>
		<category><![CDATA[Free Trial Cisco Duo]]></category>
		<guid isPermaLink="false">https://www.theblinkylight.com/?p=5157</guid>

					<description><![CDATA[<p>Digital transactions are the backbone of the financial sector, and the importance of robust digital [&#8230;]</p>
<p>The post <a href="http://www.theblinkylight.com/cisco-duo-finance/">Enhancing Client Trust in Finance: Cisco Duo&#8217;s Role in Secure Transactions</a> appeared first on <a href="http://www.theblinkylight.com">TBL Networks</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">Digital transactions are the backbone of the financial sector, and the importance of robust digital security cannot be overstated. With cyber threats evolving at an alarming rate, the need for advanced security measures to protect sensitive financial data and maintain client trust has never been more critical. Cisco Duo, is at the forefront of securing financial transactions through innovative multi-factor authentication (MFA) solutions.</span></p>
<p><span id="more-5157"></span></p>
<h2>The Importance of Multi-Factor Authentication in Finance<b><br />
</b></h2>
<p><span style="font-weight: 400;">Multi-factor authentication (MFA) adds an essential layer of security by requiring two or more verification factors to gain access to a resource, such as a financial account. This method significantly reduces the risk of unauthorized access, as compromising multiple authentication factors is considerably more challenging for cybercriminals. With the financial sector being a prime target for cyber-attacks, MFA has become a non-negotiable security measure. </span><span style="font-weight: 400;"><br />
</span><span style="font-weight: 400;"><br />
</span><span style="font-weight: 400;">The</span><a href="https://oort.io/hubfs/Reports/State-of-Identity-Security-2023.pdf?hsLang=en"><span style="font-weight: 400;"> State of Identity Report (2023)</span></a><span style="font-weight: 400;"> explains that lacking effective oversight, threat identification, and countermeasures, identity systems can become gateways for malicious access. Talos IR findings indicate that in nearly a quarter of cases, attackers exploited stolen credentials to infiltrate legitimate accounts. Furthermore, it&#8217;s reported that about 40% of accounts in an average organization are either unprotected by multi-factor authentication (MFA) or rely on less secure MFA options.</span></p>
<p><a href="https://gitnux.org/two-factor-authentication-statistics/#content"><span style="font-weight: 400;">GITNUX Market Data Report 2024</span></a><span style="font-weight: 400;"> provides the following MFA statistics:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><strong>2FA can block 100% of automated bots, 96% of phishing attacks, and 76% of targeted attacks. </strong></li>
<li style="font-weight: 400;" aria-level="1"><strong>38% of financial institutions do not believe traditional security measures can keep data safe.</strong></li>
<li style="font-weight: 400;" aria-level="1"><strong>Weak passwords are the culprit in 81% of security threats.</strong></li>
<li style="font-weight: 400;" aria-level="1"><strong>From 2017 to 2021, MFA usage increased by 51%.</strong></li>
</ul>
<p><span style="font-weight: 400;">Recent studies underscore MFA&#8217;s effectiveness, noting a dramatic decrease in data breaches and unauthorized access incidents among institutions that have implemented it.Organizations are encouraged to consider these insights and adopt MFA to bolster their defenses against cyber threats, ensuring a more secure digital environment.</span></p>
<h2><img loading="lazy" decoding="async" class="alignnone size-full wp-image-5159" src="https://www.theblinkylight.com/wp-content/uploads/2024/02/cisco-duo-blog-image-1.jpeg" alt="" width="1200" height="400" srcset="http://www.theblinkylight.com/wp-content/uploads/2024/02/cisco-duo-blog-image-1.jpeg 1200w, http://www.theblinkylight.com/wp-content/uploads/2024/02/cisco-duo-blog-image-1-300x100.jpeg 300w, http://www.theblinkylight.com/wp-content/uploads/2024/02/cisco-duo-blog-image-1-1024x341.jpeg 1024w, http://www.theblinkylight.com/wp-content/uploads/2024/02/cisco-duo-blog-image-1-768x256.jpeg 768w" sizes="(max-width: 1200px) 100vw, 1200px" /></h2>
<h2>Cisco Duo’s Role in Secure Transactions</h2>
<p><span style="font-weight: 400;">Cisco Duo enhances the security of financial transactions by leveraging advanced multi-factor authentication (MFA) techniques. It utilizes push notifications, biometrics, and other secure methods to ensure that only authenticated users can access sensitive financial data. By adopting the &#8220;zero trust security&#8221; model, which treats every user and device as potentially untrustworthy until verified, Cisco Duo significantly improves the security of transactions, providing a robust defense against unauthorized access and cyber threats.</span></p>
<h2>Benefits of Enhanced Security for Financial Institutions</h2>
<p><span style="font-weight: 400;">The integration of Cisco Duo into financial institutions&#8217; security frameworks marks a transformative leap in safeguarding sensitive data and transactions. This strategic move not only curtails the risk of data breaches and fraud but also nurtures an environment of trust and reliability that is paramount in the finance sector.</span></p>
<p>&nbsp;</p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;"><strong>Strengthened Defense Against Cyber Threats:</strong> By introducing an additional layer of authentication, Cisco Duo significantly reduces the likelihood of unauthorized access, ensuring that financial transactions and client data remain secure.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;"><strong>Enhanced Client Trust and Satisfaction:</strong> The visible commitment to security through Cisco Duo reinforces clients&#8217; confidence in their financial institution, fostering a sense of safety and loyalty.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;"><strong>Increased Client Retention and Acquisition:</strong> A secure and trustworthy banking environment, evidenced by fewer incidents of fraud and breaches, naturally attracts and retains more clients, contributing to the institution&#8217;s growth.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;"><strong>Cost-Effectiveness and High ROI:</strong> Investing in Cisco Duo is a proactive measure that, over time, proves to be cost-effective by preventing costly data breaches and fraud, thereby offering a significant return on investment.</span></li>
</ul>
<p><span style="font-weight: 400;">Through Cisco Duo, financial institutions not only fortify their defenses but also solidify their reputation as secure and client-focused entities, setting a standard for excellence in the digital age of finance.</span></p>
<p><img loading="lazy" decoding="async" class="alignnone size-full wp-image-5160" src="https://www.theblinkylight.com/wp-content/uploads/2024/02/cisco-duo-blog-image-2.jpeg" alt="" width="1200" height="400" srcset="http://www.theblinkylight.com/wp-content/uploads/2024/02/cisco-duo-blog-image-2.jpeg 1200w, http://www.theblinkylight.com/wp-content/uploads/2024/02/cisco-duo-blog-image-2-300x100.jpeg 300w, http://www.theblinkylight.com/wp-content/uploads/2024/02/cisco-duo-blog-image-2-1024x341.jpeg 1024w, http://www.theblinkylight.com/wp-content/uploads/2024/02/cisco-duo-blog-image-2-768x256.jpeg 768w" sizes="(max-width: 1200px) 100vw, 1200px" /></p>
<h2>Challenges and Considerations</h2>
<p><span style="font-weight: 400;">While the benefits are clear, financial institutions may encounter challenges when implementing MFA. To effectively implement Duo, a multi-factor authentication solution, amidst resistance within an organization, consider a strategic approach that emphasizes education, communication, phased roll out, and support. </span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><b><i>Education: </i></b><span style="font-weight: 400;">Start by educating users about the importance and benefits of Duo in enhancing security against cyber threats through early and transparent communication. Introduce the system via a pilot program to gather feedback and make necessary adjustments, ensuring a user-friendly experience.</span></li>
<li style="font-weight: 400;" aria-level="1"><b><i>Communication: </i></b><span style="font-weight: 400;">Demonstrate Duo&#8217;s ease of use and value through live demonstrations and by sharing success stories from other organizations. Provide comprehensive support, including training sessions, tutorials, and a well-equipped IT help desk to address user concerns and queries promptly.</span></li>
<li style="font-weight: 400;" aria-level="1"><b><i>Phased Roll Out: </i></b><span style="font-weight: 400;">Implement Duo in phases to minimize disruption, starting with critical systems and expanding gradually, while continuously adjusting the strategy based on user feedback. Address privacy and user experience concerns proactively, ensuring Duo integrates seamlessly with existing workflows.</span></li>
<li style="font-weight: 400;" aria-level="1"><b><i>Support</i></b><span style="font-weight: 400;">: Garner strong support from leadership to underline the initiative&#8217;s importance and encourage adoption across the organization. Maintain an open feedback mechanism to continuously monitor user experiences and improve the implementation process, adapting to evolving security needs and ensuring a smooth transition to a more secure authentication system without relying on incentives.</span></li>
</ul>
<p><span style="font-weight: 400;">Successfully integrating Cisco Duo requires addressing potential challenges with a comprehensive strategy. This approach ensures a seamless transition to a more secure authentication system, fostering a safer financial transaction environment.</span></p>
<h2>TBL Networks, Your Trusted Partner</h2>
<p><a href="https://www.theblinkylight.com/"><span style="font-weight: 400;">TBL Networks</span></a><span style="font-weight: 400;"> distinguishes itself by combining expert IT leadership with cutting-edge </span><a href="https://www.theblinkylight.com/solutions/security/"><span style="font-weight: 400;">cybersecurity solutions</span></a><span style="font-weight: 400;">, ensuring not just service but also fostering personal connections and professional growth. Our partnership approach enhances IT performance and security through advanced data solutions and managed services, leveraging strong relationships with industry leaders to optimize your enterprise&#8217;s technological capabilities.</span></p>
<p><span style="font-weight: 400;">As a Cisco Gold Certified Partner,  we leverage Duo as an advanced MFA solution to secure financial transactions. By prioritizing robust security measures, financial institutions can protect their clients&#8217; data, foster trust, and navigate the digital landscape with confidence.</span></p>
<p><span style="font-weight: 400;"> We stand ready to assist financial institutions in assessing their security needs and exploring the benefits of Cisco Duo, ensuring a safer and more trustworthy financial future.</span></p>
<h2>Start Your Duo Free Trial</h2>
<p><span style="font-weight: 400;">Embrace the advanced security solution of Duo for your  financial institution to not only protect against cyber threats but also strengthen the trust that is the foundation of your client relationships. Reach out for a </span><a href="https://www.theblinkylight.com/contact/"><span style="font-weight: 400;">consultation </span></a><span style="font-weight: 400;">or <a href="https://www.theblinkylight.com/secure-access-cisco-duo/">visit our webpage start your free trial</a>.</span></p>
<p><a href="https://www.theblinkylight.com/secure-access-cisco-duo/"><img loading="lazy" decoding="async" class="aligncenter wp-image-5168 size-full" src="https://www.theblinkylight.com/wp-content/uploads/2024/03/TBL-Duo-CTA.png" alt="cisco-duo-trial" width="3531" height="1250" srcset="http://www.theblinkylight.com/wp-content/uploads/2024/03/TBL-Duo-CTA.png 3531w, http://www.theblinkylight.com/wp-content/uploads/2024/03/TBL-Duo-CTA-300x106.png 300w, http://www.theblinkylight.com/wp-content/uploads/2024/03/TBL-Duo-CTA-1024x363.png 1024w, http://www.theblinkylight.com/wp-content/uploads/2024/03/TBL-Duo-CTA-768x272.png 768w, http://www.theblinkylight.com/wp-content/uploads/2024/03/TBL-Duo-CTA-1536x544.png 1536w, http://www.theblinkylight.com/wp-content/uploads/2024/03/TBL-Duo-CTA-2048x725.png 2048w" sizes="(max-width: 3531px) 100vw, 3531px" /></a></p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=http%3A%2F%2Fwww.theblinkylight.com%2Fcisco-duo-finance%2F&amp;linkname=Enhancing%20Client%20Trust%20in%20Finance%3A%20Cisco%20Duo%E2%80%99s%20Role%20in%20Secure%20Transactions" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_mastodon" href="https://www.addtoany.com/add_to/mastodon?linkurl=http%3A%2F%2Fwww.theblinkylight.com%2Fcisco-duo-finance%2F&amp;linkname=Enhancing%20Client%20Trust%20in%20Finance%3A%20Cisco%20Duo%E2%80%99s%20Role%20in%20Secure%20Transactions" title="Mastodon" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=http%3A%2F%2Fwww.theblinkylight.com%2Fcisco-duo-finance%2F&amp;linkname=Enhancing%20Client%20Trust%20in%20Finance%3A%20Cisco%20Duo%E2%80%99s%20Role%20in%20Secure%20Transactions" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=http%3A%2F%2Fwww.theblinkylight.com%2Fcisco-duo-finance%2F&#038;title=Enhancing%20Client%20Trust%20in%20Finance%3A%20Cisco%20Duo%E2%80%99s%20Role%20in%20Secure%20Transactions" data-a2a-url="http://www.theblinkylight.com/cisco-duo-finance/" data-a2a-title="Enhancing Client Trust in Finance: Cisco Duo’s Role in Secure Transactions"></a></p><p>The post <a href="http://www.theblinkylight.com/cisco-duo-finance/">Enhancing Client Trust in Finance: Cisco Duo&#8217;s Role in Secure Transactions</a> appeared first on <a href="http://www.theblinkylight.com">TBL Networks</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://www.theblinkylight.com/cisco-duo-finance/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Financial Services and Cybersecurity, Compliance with Cisco</title>
		<link>http://www.theblinkylight.com/financial-cybersecurity-compliance/</link>
					<comments>http://www.theblinkylight.com/financial-cybersecurity-compliance/#respond</comments>
		
		<dc:creator><![CDATA[TBL Networks]]></dc:creator>
		<pubDate>Thu, 27 Jun 2024 18:37:34 +0000</pubDate>
				<category><![CDATA[Insights]]></category>
		<category><![CDATA[cisco]]></category>
		<category><![CDATA[Free Trial]]></category>
		<guid isPermaLink="false">https://www.theblinkylight.com/?p=5210</guid>

					<description><![CDATA[<p>The International Monetary Fund’s April 2024 Global Financial Stability Report dedicated a chapter to the [&#8230;]</p>
<p>The post <a href="http://www.theblinkylight.com/financial-cybersecurity-compliance/">Financial Services and Cybersecurity, Compliance with Cisco</a> appeared first on <a href="http://www.theblinkylight.com">TBL Networks</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The International Monetary Fund’s April 2024 <a href="https://www.imf.org/en/Blogs/Articles/2024/04/09/rising-cyber-threats-pose-serious-concerns-for-financial-stability#:~:text=The%20financial%20sector%20is%20uniquely,money%20or%20disrupt%20economic%20activity.">Global Financial Stability Report</a> dedicated a chapter to the “heightened risk” financial institutions face with “greater threat” of suffering a cyberattack and extreme losses. Financial services and cybersecurity isn’t the only concern. Compliance is also a challenge. <strong>Fortunately, cutting-edge technology available from Cisco can help shore up defenses and compliance.</strong><span id="more-5210"></span></p>
<h2>Cybersecurity and Compliance Context</h2>
<p>Financial institutions make an attractive target. They store vast amounts of sensitive and valuable data and have complex infrastructure. Along with the financial motivation, a successful attack could provide notoriety or disrupt economic stability. In December 2023, an attack on five servers at the <a href="https://lestimes.com/cbl-speaks-on-cyber-attack/">Central Bank of Lesotho</a> disrupted the entire nation’s banking sector for 10 days.</p>
<p>Meanwhile, financial institutions are also subject to stringent regulatory requirements. <strong>Violations can result in severe financial penalties, reputation damage, and legal consequences.</strong></p>
<p>Given these risks, financial services and <a href="https://www.theblinkylight.com/solutions/security/">cybersecurity</a> go hand and glove. <strong>Fortunately, installing Cisco Umbrella at a financial institution can help enhance cybersecurity and ensure regulatory compliance.</strong></p>
<p><img loading="lazy" decoding="async" class="alignnone wp-image-5212 size-full" src="https://www.theblinkylight.com/wp-content/uploads/2024/04/cybersecurity-financial-company-min.jpg" alt="" width="1200" height="400" srcset="http://www.theblinkylight.com/wp-content/uploads/2024/04/cybersecurity-financial-company-min.jpg 1200w, http://www.theblinkylight.com/wp-content/uploads/2024/04/cybersecurity-financial-company-min-300x100.jpg 300w, http://www.theblinkylight.com/wp-content/uploads/2024/04/cybersecurity-financial-company-min-1024x341.jpg 1024w, http://www.theblinkylight.com/wp-content/uploads/2024/04/cybersecurity-financial-company-min-768x256.jpg 768w" sizes="(max-width: 1200px) 100vw, 1200px" /></p>
<h2>How to Integrate Umbrella into Financial IT</h2>
<p>TBL Networks offers a free, two-week trial of Cisco Umbrella. Let’s first discuss what we do, step by step, when fully integrating Umbrella into the IT infrastructure of our <a href="https://www.theblinkylight.com/case-study/cf-financial-corporation/">financial clients</a>.</p>
<ol>
<li><strong>Assess and Plan:</strong> To ensure security, reliability, and compliance, integrating Cisco Umbrella begins with exploration to understand the financial institution’s existing IT infrastructure. After identifying specific requirements, such as network size, security needs, compliance regulations (e.g., PCI DSS), and performance goals, we can design a custom integration.</li>
<li><strong>Design the Integration:</strong> In addition to DNS-layer security and interactive threat intelligence, Cisco Umbrella includes secure web gateway, firewall, and cloud access security broker (CASB) functionality, plus integration with Cisco SD-WAN, delivered from a single cloud security service. To custom design the most effective network architecture, including routers, switches, firewalls, and security appliances, we consider the firm’s unique needs as well as redundancy, scalability, and disaster recovery options.</li>
<li><strong>Installation &amp; Testing:</strong> Having identified and procured the necessary hardware and software components, we can install and configure Cisco Umbrella according to best practices and security guidelines. We don’t just trust that we’ve done it correctly. We always thoroughly test the installation to ensure proper functionality and interoperability with existing systems.</li>
<li><strong>Integration Optimization:</strong> To get the most out of integrating Cisco Umbrella with the existing infrastructure, the next step involves a lot of fine-tuning, including:
<ol>
<li>Configuring authentication and authorization mechanisms to ensure seamless access control.</li>
<li>Implementing network segmentation to isolate sensitive financial data and minimize the risk of unauthorized access.</li>
<li>Optimizing network settings for performance, security, and reliability.</li>
<li>Implementing Quality of Service (QoS) policies to prioritize critical financial transactions and data.</li>
<li>Enabling intrusion prevention systems (IPS), malware detection, and content filtering to safeguard against cyber threats.</li>
<li>Implementing encryption protocols (e.g., SSL/TLS) to secure data in transit and at rest.</li>
</ol>
</li>
<li><strong>Monitoring and Management:</strong> Even after the integration is up and running and effectively optimized, monitoring and management is key. This helps ensure ongoing network performance and security. Regular updates of firmware and software patches is also essential to mitigate known vulnerabilities. Plus, this step helps us to be proactive about detecting and responding to potential security incidents. Conducting regular assessments and audits helps us to identify areas for improvement. Meanwhile, TBL stays up to date on new Umbrella features that could further enhance the institution&#8217;s IT infrastructure. It’s all part of continuously optimizing and refining the integration to adapt to both the financial institution’s dynamic business requirements and evolving security threats.</li>
</ol>
<h2><img loading="lazy" decoding="async" class="alignnone wp-image-5213 size-full" src="https://www.theblinkylight.com/wp-content/uploads/2024/04/bank-employees-plan-cisco-umbrella-min.jpg" alt="" width="1200" height="400" srcset="http://www.theblinkylight.com/wp-content/uploads/2024/04/bank-employees-plan-cisco-umbrella-min.jpg 1200w, http://www.theblinkylight.com/wp-content/uploads/2024/04/bank-employees-plan-cisco-umbrella-min-300x100.jpg 300w, http://www.theblinkylight.com/wp-content/uploads/2024/04/bank-employees-plan-cisco-umbrella-min-1024x341.jpg 1024w, http://www.theblinkylight.com/wp-content/uploads/2024/04/bank-employees-plan-cisco-umbrella-min-768x256.jpg 768w" sizes="(max-width: 1200px) 100vw, 1200px" /></h2>
<h2>Financial Services and Cybersecurity and TBL</h2>
<p>With this step-by-step approach to deploying Cisco Umbrella in a financial IT environment, TBL helps mitigate cybersecurity risks, strengthens regulatory compliance efforts, and ensures a secure and productive digital environment for employees and customers alike.</p>
<p>You can try Umbrella for 14 days in just ten minutes with a trial of Umbrella’s offering. Easily enjoy advanced threat protection, cloud and DNS-level security, and more.</p>
<p style="text-align: center;"><a href="https://www.theblinkylight.com/secure-network-free-trial/"><img decoding="async" class="aligncenter wp-image-5166 size-full" src="http://www.theblinkylight.com/wp-content/uploads/2024/03/TBL-Umbrella-CTA.png" alt="cisco-umbrella-trial" width="3531" height="1250" srcset="http://www.theblinkylight.com/wp-content/uploads/2024/03/TBL-Umbrella-CTA.png 3531w, http://www.theblinkylight.com/wp-content/uploads/2024/03/TBL-Umbrella-CTA-300x106.png 300w, http://www.theblinkylight.com/wp-content/uploads/2024/03/TBL-Umbrella-CTA-1024x363.png 1024w, http://www.theblinkylight.com/wp-content/uploads/2024/03/TBL-Umbrella-CTA-768x272.png 768w, http://www.theblinkylight.com/wp-content/uploads/2024/03/TBL-Umbrella-CTA-1536x544.png 1536w, http://www.theblinkylight.com/wp-content/uploads/2024/03/TBL-Umbrella-CTA-2048x725.png 2048w" sizes="(max-width: 3531px) 100vw, 3531px" /></a></p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=http%3A%2F%2Fwww.theblinkylight.com%2Ffinancial-cybersecurity-compliance%2F&amp;linkname=Financial%20Services%20and%20Cybersecurity%2C%20Compliance%20with%20Cisco" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_mastodon" href="https://www.addtoany.com/add_to/mastodon?linkurl=http%3A%2F%2Fwww.theblinkylight.com%2Ffinancial-cybersecurity-compliance%2F&amp;linkname=Financial%20Services%20and%20Cybersecurity%2C%20Compliance%20with%20Cisco" title="Mastodon" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=http%3A%2F%2Fwww.theblinkylight.com%2Ffinancial-cybersecurity-compliance%2F&amp;linkname=Financial%20Services%20and%20Cybersecurity%2C%20Compliance%20with%20Cisco" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=http%3A%2F%2Fwww.theblinkylight.com%2Ffinancial-cybersecurity-compliance%2F&#038;title=Financial%20Services%20and%20Cybersecurity%2C%20Compliance%20with%20Cisco" data-a2a-url="http://www.theblinkylight.com/financial-cybersecurity-compliance/" data-a2a-title="Financial Services and Cybersecurity, Compliance with Cisco"></a></p><p>The post <a href="http://www.theblinkylight.com/financial-cybersecurity-compliance/">Financial Services and Cybersecurity, Compliance with Cisco</a> appeared first on <a href="http://www.theblinkylight.com">TBL Networks</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://www.theblinkylight.com/financial-cybersecurity-compliance/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Changes Implemented with NPS Feedback</title>
		<link>http://www.theblinkylight.com/changes-implemented-with-nps-feedback/</link>
					<comments>http://www.theblinkylight.com/changes-implemented-with-nps-feedback/#respond</comments>
		
		<dc:creator><![CDATA[Lauren Bell]]></dc:creator>
		<pubDate>Fri, 14 Jun 2019 18:44:08 +0000</pubDate>
				<category><![CDATA[Insights]]></category>
		<guid isPermaLink="false">http://www.theblinkylight.com/?p=4290</guid>

					<description><![CDATA[<p>&#160; In late 2018, TBL implemented the Net Promotor System, or NPS, which is a [&#8230;]</p>
<p>The post <a href="http://www.theblinkylight.com/changes-implemented-with-nps-feedback/">Changes Implemented with NPS Feedback</a> appeared first on <a href="http://www.theblinkylight.com">TBL Networks</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>&nbsp;</p>
<p>In late 2018, TBL implemented the Net Promotor System, or NPS, which is a methodology for gauging customer satisfaction through the eyes of customers. TBL is leveraging this system to capture feedback with the goal to improve every aspect of our business. Since its launch, we&#8217;ve collected our customer feedback, categorized that feedback and began implementing change. Here is a look at what we&#8217;ve done so far.</p>
<p><iframe src="https://player.vimeo.com/video/342088225?dnt=1&amp;app_id=122963" width="640" height="360" frameborder="0" allow="autoplay; fullscreen; picture-in-picture; clipboard-write"></iframe></p>
<h2><strong>1. Launched a webinar series </strong></h2>
<p>We heard a clear desire for more proactive webinars &amp; training around what TBL is seeing in the marketplace and what changes we see happening on the horizon. We’ve since introduced a series of webinars aimed at educating and updating our clients and prospects.</p>
<p>You can watch some of our recent webinars here:</p>
<p><a href="https://www.theblinkylight.com/cisco-umbrella-webinar/" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="alignnone wp-image-4068" src="https://www.theblinkylight.com/wp-content/uploads/2019/04/welcome-e1557169010205.jpg" alt="" width="358" height="202" /></a></p>
<p><a href="https://www.theblinkylight.com/video-amp-for-endpoints-presentation-and-demo/" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="alignnone wp-image-4239" src="https://www.theblinkylight.com/wp-content/uploads/2019/06/Cisco-AMP-for-Endpoints-Demo-Virginia-e1559934095550.png" alt="" width="360" height="198" /></a></p>
<h2><strong>2. New tiers of service for Limelight Subscribe </strong></h2>
<p>TBL is introducing three tiers of service for our Limelight Subscribe service. We previously offered one subscription model – leaving little room for modifications. We learned that our customers have team members with skill sets allowing them to conduct some aspects of the limelight subscribe service internally. With the new tiers of service, customers can choose what package best suits their organization.</p>
<h2><strong>3. Retrained Sales &amp; Engineers on SLA Standards.</strong></h2>
<p>The conversations around SLA’s generally were around providing clear and documented expectations for our clients to set for the business. Since these conversations arose, we took this as an opportunity to retrain our engineering &amp; sales teams on standards; making certain SLA’s are understood, documented and measurable for our clients.</p>
<h2>More Updates to Come</h2>
<p>The NPS process is most effective when people take about 3 minutes to fill out the survey and provide honest feedback- both positive and constructive. We want to know what people love about TBL just as much as we need to learn what we can improve. The next time you see our survey in your inbox, please let us know how we&#8217;re doing so we can continue to improve!</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=http%3A%2F%2Fwww.theblinkylight.com%2Fchanges-implemented-with-nps-feedback%2F&amp;linkname=Changes%20Implemented%20with%20NPS%20Feedback" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_mastodon" href="https://www.addtoany.com/add_to/mastodon?linkurl=http%3A%2F%2Fwww.theblinkylight.com%2Fchanges-implemented-with-nps-feedback%2F&amp;linkname=Changes%20Implemented%20with%20NPS%20Feedback" title="Mastodon" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=http%3A%2F%2Fwww.theblinkylight.com%2Fchanges-implemented-with-nps-feedback%2F&amp;linkname=Changes%20Implemented%20with%20NPS%20Feedback" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=http%3A%2F%2Fwww.theblinkylight.com%2Fchanges-implemented-with-nps-feedback%2F&#038;title=Changes%20Implemented%20with%20NPS%20Feedback" data-a2a-url="http://www.theblinkylight.com/changes-implemented-with-nps-feedback/" data-a2a-title="Changes Implemented with NPS Feedback"></a></p><p>The post <a href="http://www.theblinkylight.com/changes-implemented-with-nps-feedback/">Changes Implemented with NPS Feedback</a> appeared first on <a href="http://www.theblinkylight.com">TBL Networks</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://www.theblinkylight.com/changes-implemented-with-nps-feedback/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Video: AMP for Endpoints Presentation and Demo</title>
		<link>http://www.theblinkylight.com/video-amp-for-endpoints-presentation-and-demo/</link>
					<comments>http://www.theblinkylight.com/video-amp-for-endpoints-presentation-and-demo/#respond</comments>
		
		<dc:creator><![CDATA[Lauren Bell]]></dc:creator>
		<pubDate>Fri, 07 Jun 2019 19:05:27 +0000</pubDate>
				<category><![CDATA[Insights]]></category>
		<guid isPermaLink="false">http://www.theblinkylight.com/?p=4238</guid>

					<description><![CDATA[<p>AMP continuously analyzes file activity across your extended network, so you can quickly detect, contain, [&#8230;]</p>
<p>The post <a href="http://www.theblinkylight.com/video-amp-for-endpoints-presentation-and-demo/">Video: AMP for Endpoints Presentation and Demo</a> appeared first on <a href="http://www.theblinkylight.com">TBL Networks</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span class="TextRun SCXW176903229 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="none"><span class="NormalTextRun SCXW176903229 BCX0">AMP continuously analyzes file activity across your extended network, so you can quickly detect, contain, and remove advanced malware</span></span></p>
<p><span class="TextRun SCXW229012437 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun SCXW229012437 BCX0">Every antivirus and endpoint protection tool </span></span><span class="TextRun SCXW229012437 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="ContextualSpellingAndGrammarError SCXW229012437 BCX0">fails</span></span><span class="TextRun SCXW229012437 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun SCXW229012437 BCX0"> at some point in time- malicious files inevitably enter into networks. </span></span><span class="TextRun SCXW229012437 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="AdvancedProofingIssue SCXW229012437 BCX0">This is why</span></span><span class="TextRun SCXW229012437 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun SCXW229012437 BCX0"> continual detection and continual monitoring is crucial. AM</span></span><span class="TextRun SCXW229012437 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun SCXW229012437 BCX0">P</span></span><span class="TextRun SCXW229012437 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun SCXW229012437 BCX0"> for endpoints analyzes file and process</span></span><span class="TextRun SCXW229012437 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="none"><span class="NormalTextRun SCXW229012437 BCX0"> </span></span><span class="TextRun SCXW229012437 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun SCXW229012437 BCX0">activity to rapidly detect, contain, and remediate threats that can evade front-line defenses.</span></span><span class="EOP SCXW229012437 BCX0" data-ccp-props="{}"> Learn about AMP in our recorded webinar.</span></p>
<p>&nbsp;</p>
<p><iframe src="https://player.vimeo.com/video/340971201?dnt=1&amp;app_id=122963" width="640" height="360" frameborder="0" allow="autoplay; fullscreen; picture-in-picture; clipboard-write"></iframe></p>
<p>&nbsp;</p>
<p><a href="https://www.theblinkylight.com/try_amp/" target="_blank" rel="noopener">Request a free 2 week trial of AMP for Endpoints here. </a></p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=http%3A%2F%2Fwww.theblinkylight.com%2Fvideo-amp-for-endpoints-presentation-and-demo%2F&amp;linkname=Video%3A%20AMP%20for%20Endpoints%20Presentation%20and%20Demo" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_mastodon" href="https://www.addtoany.com/add_to/mastodon?linkurl=http%3A%2F%2Fwww.theblinkylight.com%2Fvideo-amp-for-endpoints-presentation-and-demo%2F&amp;linkname=Video%3A%20AMP%20for%20Endpoints%20Presentation%20and%20Demo" title="Mastodon" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=http%3A%2F%2Fwww.theblinkylight.com%2Fvideo-amp-for-endpoints-presentation-and-demo%2F&amp;linkname=Video%3A%20AMP%20for%20Endpoints%20Presentation%20and%20Demo" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=http%3A%2F%2Fwww.theblinkylight.com%2Fvideo-amp-for-endpoints-presentation-and-demo%2F&#038;title=Video%3A%20AMP%20for%20Endpoints%20Presentation%20and%20Demo" data-a2a-url="http://www.theblinkylight.com/video-amp-for-endpoints-presentation-and-demo/" data-a2a-title="Video: AMP for Endpoints Presentation and Demo"></a></p><p>The post <a href="http://www.theblinkylight.com/video-amp-for-endpoints-presentation-and-demo/">Video: AMP for Endpoints Presentation and Demo</a> appeared first on <a href="http://www.theblinkylight.com">TBL Networks</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://www.theblinkylight.com/video-amp-for-endpoints-presentation-and-demo/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>TBL Co-Founder, Patrick Tredway, Transitions to CEO Role</title>
		<link>http://www.theblinkylight.com/tbl-co-founder-patrick-tredway-transitions-to-ceo-role/</link>
					<comments>http://www.theblinkylight.com/tbl-co-founder-patrick-tredway-transitions-to-ceo-role/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 17 May 2019 14:16:05 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<guid isPermaLink="false">http://www.theblinkylight.com/?p=4125</guid>

					<description><![CDATA[<p>One of TBL’s three original founders, Patrick Tredway, recently transitioned to the role of CEO. [&#8230;]</p>
<p>The post <a href="http://www.theblinkylight.com/tbl-co-founder-patrick-tredway-transitions-to-ceo-role/">TBL Co-Founder, Patrick Tredway, Transitions to CEO Role</a> appeared first on <a href="http://www.theblinkylight.com">TBL Networks</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="wp-image-4129 alignleft" src="https://www.theblinkylight.com/wp-content/uploads/2019/05/Patrick-Treway.png" alt="" width="193" height="190" srcset="http://www.theblinkylight.com/wp-content/uploads/2019/05/Patrick-Treway.png 702w, http://www.theblinkylight.com/wp-content/uploads/2019/05/Patrick-Treway-300x295.png 300w" sizes="(max-width: 193px) 100vw, 193px" /></p>
<p>One of TBL’s three original founders, Patrick Tredway, recently transitioned to the role of CEO. Chief Financial Officer and collaboration and data center practice lead were Tredway’s previous titles. Since TBL’s beginning in 2007, Tredway has been integral in decision making, product offering development and deliverability. This new role as CEO is a natural transition for him.</p>
<p>“The pace of change for TBL and our customers is accelerating and we’ve recognized the need to quicken our decision making and investments. As such, we’ve streamlined our decision-making process so that we can deliver new service features and improvements at a quicker pace to meet demands,” Tredway explains. This streamlining is already allowing TBL to bring new service engagement models to market that will better align with our customers’ journeys.</p>
<h1>Tredway&#8217;s vision focuses on two key areas:</h1>
<h2>Customer Experience</h2>
<p>We want to grow by way of our customers’ delight with the level of service they receive from TBL. “The change in our focus to customer experience above all else will not just come about because we say so. This will be a metamorphosis spurred on by investment, training, and an unyielding focus on nothing but the best,” Tredway explains. This change will also be brought about by the recognition that the customer experience we deliver is intrinsically capped by our employee experience. As these investments, training activities, and new processes are implemented, they will target the experience of both our customers and our employees.</p>
<h2>Customer Alignment</h2>
<p>The second key tenant of this plan is more closely aligning with our customers and the paths they’re on. We will foster better dialogue and chart out where each of our customer types is right now and where they’re going. The output of this will provide the backdrop for what products, services, and engagement models we need to have ready for each customer type and when. Tredway adds, “Essentially, as our customers are running their race, we’re going to position ourselves at each milepost and be ready to offer the cup of water from the side of the road.”</p>
<p>Even with as much overuse as the word gets, our ability to be <em>innovative</em> on behalf of our customers is what will set us apart. Whether it’s new consumption models added to our Limelight Subscribe portfolio, the continued development of our clearIQ analytics platform, or our entry into true technology service automation, we’re positioning ourselves to be where our customers need us to be when they need us to be there.</p>
<p>“I and the rest of TBL are invested in customer success and we’re incredibly excited about the things to come,” Patrick concludes.</p>
<p>Get to know our new CEO in this video interview:</p>
<p><iframe title="Patrick Tredway Interview" src="https://player.vimeo.com/video/334930704?dnt=1&amp;app_id=122963" width="640" height="360" frameborder="0" allow="autoplay; fullscreen; picture-in-picture; clipboard-write"></iframe></p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=http%3A%2F%2Fwww.theblinkylight.com%2Ftbl-co-founder-patrick-tredway-transitions-to-ceo-role%2F&amp;linkname=TBL%20Co-Founder%2C%20Patrick%20Tredway%2C%20Transitions%20to%20CEO%20Role" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_mastodon" href="https://www.addtoany.com/add_to/mastodon?linkurl=http%3A%2F%2Fwww.theblinkylight.com%2Ftbl-co-founder-patrick-tredway-transitions-to-ceo-role%2F&amp;linkname=TBL%20Co-Founder%2C%20Patrick%20Tredway%2C%20Transitions%20to%20CEO%20Role" title="Mastodon" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=http%3A%2F%2Fwww.theblinkylight.com%2Ftbl-co-founder-patrick-tredway-transitions-to-ceo-role%2F&amp;linkname=TBL%20Co-Founder%2C%20Patrick%20Tredway%2C%20Transitions%20to%20CEO%20Role" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=http%3A%2F%2Fwww.theblinkylight.com%2Ftbl-co-founder-patrick-tredway-transitions-to-ceo-role%2F&#038;title=TBL%20Co-Founder%2C%20Patrick%20Tredway%2C%20Transitions%20to%20CEO%20Role" data-a2a-url="http://www.theblinkylight.com/tbl-co-founder-patrick-tredway-transitions-to-ceo-role/" data-a2a-title="TBL Co-Founder, Patrick Tredway, Transitions to CEO Role"></a></p><p>The post <a href="http://www.theblinkylight.com/tbl-co-founder-patrick-tredway-transitions-to-ceo-role/">TBL Co-Founder, Patrick Tredway, Transitions to CEO Role</a> appeared first on <a href="http://www.theblinkylight.com">TBL Networks</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://www.theblinkylight.com/tbl-co-founder-patrick-tredway-transitions-to-ceo-role/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Employee Spotlight: Patrick Tredway</title>
		<link>http://www.theblinkylight.com/employee-spotlight-patrick-tredway/</link>
					<comments>http://www.theblinkylight.com/employee-spotlight-patrick-tredway/#respond</comments>
		
		<dc:creator><![CDATA[Lauren Bell]]></dc:creator>
		<pubDate>Thu, 16 May 2019 20:20:44 +0000</pubDate>
				<category><![CDATA[Employee Spotlights]]></category>
		<guid isPermaLink="false">http://www.theblinkylight.com/?p=4138</guid>

					<description><![CDATA[<p>Patrick is a co-founder and CEO of TBL. In 2007, he, David Cantwell and Alan [&#8230;]</p>
<p>The post <a href="http://www.theblinkylight.com/employee-spotlight-patrick-tredway/">Employee Spotlight: Patrick Tredway</a> appeared first on <a href="http://www.theblinkylight.com">TBL Networks</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Patrick is a co-founder and CEO of TBL. In 2007, he, David Cantwell and Alan Sears formed TBL Networks. Get to know Patrick in this video interview!</p>
<p><iframe title="Patrick Tredway Interview" src="https://player.vimeo.com/video/334930704?dnt=1&amp;app_id=122963" width="640" height="360" frameborder="0" allow="autoplay; fullscreen; picture-in-picture; clipboard-write"></iframe></p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=http%3A%2F%2Fwww.theblinkylight.com%2Femployee-spotlight-patrick-tredway%2F&amp;linkname=Employee%20Spotlight%3A%20Patrick%20Tredway" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_mastodon" href="https://www.addtoany.com/add_to/mastodon?linkurl=http%3A%2F%2Fwww.theblinkylight.com%2Femployee-spotlight-patrick-tredway%2F&amp;linkname=Employee%20Spotlight%3A%20Patrick%20Tredway" title="Mastodon" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=http%3A%2F%2Fwww.theblinkylight.com%2Femployee-spotlight-patrick-tredway%2F&amp;linkname=Employee%20Spotlight%3A%20Patrick%20Tredway" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=http%3A%2F%2Fwww.theblinkylight.com%2Femployee-spotlight-patrick-tredway%2F&#038;title=Employee%20Spotlight%3A%20Patrick%20Tredway" data-a2a-url="http://www.theblinkylight.com/employee-spotlight-patrick-tredway/" data-a2a-title="Employee Spotlight: Patrick Tredway"></a></p><p>The post <a href="http://www.theblinkylight.com/employee-spotlight-patrick-tredway/">Employee Spotlight: Patrick Tredway</a> appeared first on <a href="http://www.theblinkylight.com">TBL Networks</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://www.theblinkylight.com/employee-spotlight-patrick-tredway/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Past Event: June 6th: Advanced Malware Protection for Endpoints (AMP) Webinar</title>
		<link>http://www.theblinkylight.com/june-6th-advanced-malware-protection-for-endpoints-amp-webinar/</link>
					<comments>http://www.theblinkylight.com/june-6th-advanced-malware-protection-for-endpoints-amp-webinar/#respond</comments>
		
		<dc:creator><![CDATA[Lauren Bell]]></dc:creator>
		<pubDate>Mon, 06 May 2019 18:31:37 +0000</pubDate>
				<category><![CDATA[Events]]></category>
		<guid isPermaLink="false">http://www.theblinkylight.com/?p=4063</guid>

					<description><![CDATA[<p>Join us for lunch on June 6th! AMP also continuously analyzes file activity across your [&#8230;]</p>
<p>The post <a href="http://www.theblinkylight.com/june-6th-advanced-malware-protection-for-endpoints-amp-webinar/">Past Event: June 6th: Advanced Malware Protection for Endpoints (AMP) Webinar</a> appeared first on <a href="http://www.theblinkylight.com">TBL Networks</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h1><span class="TextRun SCXW176903229 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="none"><span class="NormalTextRun SCXW176903229 BCX0">Join us for lunch on June 6th! </span></span></h1>
<p><span class="TextRun SCXW176903229 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="none"><span class="NormalTextRun SCXW176903229 BCX0">AMP also continuously analyzes file activity across your extended network, so you can quickly detect, contain, and remove advanced malware</span></span></p>
<p><span class="TextRun SCXW229012437 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun SCXW229012437 BCX0">Every antivirus and endpoint protection tool </span></span><span class="TextRun SCXW229012437 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="ContextualSpellingAndGrammarError SCXW229012437 BCX0">fails</span></span><span class="TextRun SCXW229012437 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun SCXW229012437 BCX0"> at some point in time- malicious files inevitably enter into networks. </span></span><span class="TextRun SCXW229012437 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="AdvancedProofingIssue SCXW229012437 BCX0">This is why</span></span><span class="TextRun SCXW229012437 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun SCXW229012437 BCX0"> continual detection and continual monitoring is crucial. AM</span></span><span class="TextRun SCXW229012437 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun SCXW229012437 BCX0">P</span></span><span class="TextRun SCXW229012437 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun SCXW229012437 BCX0"> for endpoints analyzes file and process</span></span><span class="TextRun SCXW229012437 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="none"><span class="NormalTextRun SCXW229012437 BCX0"> </span></span><span class="TextRun SCXW229012437 BCX0" lang="EN-US" xml:lang="EN-US" data-contrast="auto"><span class="NormalTextRun SCXW229012437 BCX0">activity to rapidly detect, contain, and remediate threats that can evade front-line defenses.</span></span><span class="EOP SCXW229012437 BCX0" data-ccp-props="{}"> </span></p>
<p><a href="https://www.theblinkylight.com/learn_amp/" target="_blank" rel="noopener"><img loading="lazy" decoding="async" class="alignnone wp-image-4067" src="https://www.theblinkylight.com/wp-content/uploads/2019/05/AMP-Register-CTA.png" alt="" width="227" height="115" srcset="http://www.theblinkylight.com/wp-content/uploads/2019/05/AMP-Register-CTA.png 698w, http://www.theblinkylight.com/wp-content/uploads/2019/05/AMP-Register-CTA-300x152.png 300w" sizes="(max-width: 227px) 100vw, 227px" /></a></p>
<p><iframe src="https://player.vimeo.com/video/334493589?dnt=1&amp;app_id=122963" width="640" height="360" frameborder="0" allow="autoplay; fullscreen; picture-in-picture; clipboard-write"></iframe></p>
<p>&nbsp;</p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=http%3A%2F%2Fwww.theblinkylight.com%2Fjune-6th-advanced-malware-protection-for-endpoints-amp-webinar%2F&amp;linkname=Past%20Event%3A%20June%206th%3A%20Advanced%20Malware%20Protection%20for%20Endpoints%20%28AMP%29%20Webinar" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_mastodon" href="https://www.addtoany.com/add_to/mastodon?linkurl=http%3A%2F%2Fwww.theblinkylight.com%2Fjune-6th-advanced-malware-protection-for-endpoints-amp-webinar%2F&amp;linkname=Past%20Event%3A%20June%206th%3A%20Advanced%20Malware%20Protection%20for%20Endpoints%20%28AMP%29%20Webinar" title="Mastodon" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=http%3A%2F%2Fwww.theblinkylight.com%2Fjune-6th-advanced-malware-protection-for-endpoints-amp-webinar%2F&amp;linkname=Past%20Event%3A%20June%206th%3A%20Advanced%20Malware%20Protection%20for%20Endpoints%20%28AMP%29%20Webinar" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=http%3A%2F%2Fwww.theblinkylight.com%2Fjune-6th-advanced-malware-protection-for-endpoints-amp-webinar%2F&#038;title=Past%20Event%3A%20June%206th%3A%20Advanced%20Malware%20Protection%20for%20Endpoints%20%28AMP%29%20Webinar" data-a2a-url="http://www.theblinkylight.com/june-6th-advanced-malware-protection-for-endpoints-amp-webinar/" data-a2a-title="Past Event: June 6th: Advanced Malware Protection for Endpoints (AMP) Webinar"></a></p><p>The post <a href="http://www.theblinkylight.com/june-6th-advanced-malware-protection-for-endpoints-amp-webinar/">Past Event: June 6th: Advanced Malware Protection for Endpoints (AMP) Webinar</a> appeared first on <a href="http://www.theblinkylight.com">TBL Networks</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://www.theblinkylight.com/june-6th-advanced-malware-protection-for-endpoints-amp-webinar/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Great Cyber Hygiene:  Preventing a Ransomware Attack According to the FBI</title>
		<link>http://www.theblinkylight.com/great-cyber-hygiene-preventing-a-ransomware-attack-according-to-the-fbi/</link>
					<comments>http://www.theblinkylight.com/great-cyber-hygiene-preventing-a-ransomware-attack-according-to-the-fbi/#respond</comments>
		
		<dc:creator><![CDATA[Lauren Bell]]></dc:creator>
		<pubDate>Mon, 06 May 2019 16:13:43 +0000</pubDate>
				<category><![CDATA[Insights]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[multiauthentication]]></category>
		<category><![CDATA[ransomware]]></category>
		<guid isPermaLink="false">http://www.theblinkylight.com/?p=4062</guid>

					<description><![CDATA[<p>In CBS News&#8217; 60 minutes feature on ransomware, The FBI’s Mike Christman explains how to prevent [&#8230;]</p>
<p>The post <a href="http://www.theblinkylight.com/great-cyber-hygiene-preventing-a-ransomware-attack-according-to-the-fbi/">Great Cyber Hygiene:  Preventing a Ransomware Attack According to the FBI</a> appeared first on <a href="http://www.theblinkylight.com">TBL Networks</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In CBS News&#8217; 60 minutes feature on ransomware, The FBI’s Mike Christman explains how to prevent a ransomware attack using &#8216;Great Cyber Hygiene.&#8217;</p>
<ul>
<li>Patch your networks, regularly and rapidly</li>
<li>Use dual or multi-authentication authentication for passwords.</li>
<li>Secure your backups offline.</li>
<li>Set Up internal firewalls so that actors that already have access cannot move laterally through the network</li>
<li>Understand that allowing remote access for your employees creates an additional set of vulnerabilities</li>
</ul>
<p><a href="https://www.cbsnews.com/news/ransomware-how-cybercriminals-hold-data-hostage-and-why-the-best-solution-is-often-paying-a-ransom-60-minutes-2019-05-05/" target="_blank" rel="noopener">Watch the full story here. </a></p>
<p>The report also highlights recent ransomware attacks on Cleveland Airport, <a href="https://www.hancockregionalhospital.org/2018/01/cyber-attack-pov-ceo/" target="_blank" rel="noopener">The Hancock Regional Hospital</a>, who began diverting emergency patients to another hospital 20 miles away during the attack, and <a href="https://www.wbrc.com/story/37635768/city-of-leeds-falls-victim-to-ransomware-attack/" target="_blank" rel="noopener">Leeds Alabama,</a> who was left to conduct governing with pen and paper.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p><a class="a2a_button_facebook" href="https://www.addtoany.com/add_to/facebook?linkurl=http%3A%2F%2Fwww.theblinkylight.com%2Fgreat-cyber-hygiene-preventing-a-ransomware-attack-according-to-the-fbi%2F&amp;linkname=Great%20Cyber%20Hygiene%3A%20%20Preventing%20a%20Ransomware%20Attack%20According%20to%20the%20FBI" title="Facebook" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_mastodon" href="https://www.addtoany.com/add_to/mastodon?linkurl=http%3A%2F%2Fwww.theblinkylight.com%2Fgreat-cyber-hygiene-preventing-a-ransomware-attack-according-to-the-fbi%2F&amp;linkname=Great%20Cyber%20Hygiene%3A%20%20Preventing%20a%20Ransomware%20Attack%20According%20to%20the%20FBI" title="Mastodon" rel="nofollow noopener" target="_blank"></a><a class="a2a_button_email" href="https://www.addtoany.com/add_to/email?linkurl=http%3A%2F%2Fwww.theblinkylight.com%2Fgreat-cyber-hygiene-preventing-a-ransomware-attack-according-to-the-fbi%2F&amp;linkname=Great%20Cyber%20Hygiene%3A%20%20Preventing%20a%20Ransomware%20Attack%20According%20to%20the%20FBI" title="Email" rel="nofollow noopener" target="_blank"></a><a class="a2a_dd addtoany_share_save addtoany_share" href="https://www.addtoany.com/share#url=http%3A%2F%2Fwww.theblinkylight.com%2Fgreat-cyber-hygiene-preventing-a-ransomware-attack-according-to-the-fbi%2F&#038;title=Great%20Cyber%20Hygiene%3A%20%20Preventing%20a%20Ransomware%20Attack%20According%20to%20the%20FBI" data-a2a-url="http://www.theblinkylight.com/great-cyber-hygiene-preventing-a-ransomware-attack-according-to-the-fbi/" data-a2a-title="Great Cyber Hygiene:  Preventing a Ransomware Attack According to the FBI"></a></p><p>The post <a href="http://www.theblinkylight.com/great-cyber-hygiene-preventing-a-ransomware-attack-according-to-the-fbi/">Great Cyber Hygiene:  Preventing a Ransomware Attack According to the FBI</a> appeared first on <a href="http://www.theblinkylight.com">TBL Networks</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://www.theblinkylight.com/great-cyber-hygiene-preventing-a-ransomware-attack-according-to-the-fbi/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
