<?xml version="1.0" encoding="UTF-8"?><rss
version="2.0"
xmlns:content="http://purl.org/rss/1.0/modules/content/"
xmlns:wfw="http://wellformedweb.org/CommentAPI/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:atom="http://www.w3.org/2005/Atom"
xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
><channel><title>Red Tree Communications |</title> <atom:link href="https://www.redtreecommunications.com/category/networking/feed/" rel="self" type="application/rss+xml" /><link>https://www.redtreecommunications.com</link> <description></description> <lastBuildDate>Wed, 14 Jul 2021 15:17:30 +0000</lastBuildDate> <language>en-US</language> <sy:updatePeriod> hourly </sy:updatePeriod> <sy:updateFrequency> 1 </sy:updateFrequency> <generator>https://wordpress.org/?v=6.9.1</generator><image> <url>https://www.redtreecommunications.com/wp-content/uploads/2020/12/cropped-redtree-32x32.jpg</url><title>Red Tree Communications |</title><link>https://www.redtreecommunications.com</link> <width>32</width> <height>32</height> </image> <item><title>How to avoid ransomware attacks at work</title><link>https://www.redtreecommunications.com/2021/07/14/how-to-avoid-ransomware-attacks-at-work/</link> <dc:creator><![CDATA[summest]]></dc:creator> <pubDate>Wed, 14 Jul 2021 14:53:22 +0000</pubDate> <category><![CDATA[Data Privacy]]></category> <category><![CDATA[Networking]]></category> <category><![CDATA[Virus Protection]]></category> <category><![CDATA[Work and Technology]]></category> <guid
isPermaLink="false">https://www.redtreecommunications.com/?p=19160</guid><description><![CDATA[By Tatum Hunter, Washington Post, July 8, 2021&#124; When a security vulnerability at IT software-maker Kaseya led to a ransomware attack that affected 800 to 1,500 businesses, it wasn’t one employee’s fault. But that’s not always the case. Ransomware, which locks down a target’s computers and data,...]]></description> <content:encoded><![CDATA[<p></p></p><p>By <a
href="https://www.washingtonpost.com/people/tatum-hunter/">Tatum Hunter</a>, Washington Post, July 8, 2021|</p><p>When a security vulnerability at IT software-maker Kaseya led to a ransomware attack that affected <a
style="font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-weight: var( --e-global-typography-text-font-weight );" href="https://www.washingtonpost.com/business/2021/07/06/kaseya-ransomware-attack-victims/?itid=lk_inline_manual_2">800 to 1,500 businesses</a>, it wasn’t one employee’s fault.</p><p><p></p><p></p></p><p>But that’s not always the case.</p><p><p></p><p></p></p><p>Ransomware, which locks down a target’s computers and data, can infect a network a few different ways, including through employee accounts. Click the wrong link, open the wrong attachment or log into the wrong website, and you could put your company in a perilous position.</p><p><p></p><p></p></p><p>Depending on their roles, some employees find their inboxes flooded with hundreds of phishing emails designed to steal the recipient’s credentials, says Ryan Kalember, executive vice president of cybersecurity strategy at security firm Proofpoint. That requires constant attention, especially as ransomware attacks <a
href="https://www.washingtonpost.com/news/the-switch/wp/2017/05/15/how-to-protect-yourself-from-the-global-ransomware-attack/?itid=lk_inline_manual_6">become more frequent</a> and their demands more intense. The average ransomware payment has nearly tripled so far in 2021 compared to last year, with targets doling out about $850,000, according to <a
href="https://unit42.paloaltonetworks.com/darkside-ransomware/" target="_blank" rel="noreferrer noopener">a report</a> by Palo Alto Networks.</p><p><p></p><p></p></p><p>“If you have a word like ‘accounts’ in your title, you will be attacked more,” Kalember says.</p><p><p></p><p></p></p><p>And that doesn’t mean others should let their guards down. Plenty of firms don’t have the resources to invest in frequent training, software upgrades and security systems — so employees become the first line of defense.</p><p><p></p><p></p></p><p>Luckily, conning people is an ancient art, and <a
href="https://www.washingtonpost.com/business/2021/05/12/ransomware-attack/?itid=lk_inline_manual_11" target="_blank" rel="noreferrer noopener">ransomware</a> groups aren’t breaking new ground. Phishing emails aim for an emotional reaction, says Palo Alto Networks Deputy Director of Threat Intelligence Jen Miller-Osborn. These messages pull busy employees in with promises of money, important company secrets and even cute animals pictures.</p><p><p></p><p></p></p><p>Keep an eye out for these phishing red flags to avoid ransomware and cover your behind.</p><p
data-el="text">Here’s how employers can help individuals guard against phishing and ransomware:</p><p
data-el="text"><strong>Train employees to spot phishing attempts</strong></p><p
data-el="text">Employees need frequent training to keep up with the evolving format and content of phishing emails. <a
href="https://www.usenix.org/system/files/soups2020-reinheimer_0.pdf">One study</a> from a few German universities found employees’ ability to identify phishing attempts drops just six months after their initial training, and that video and interactive training courses are most effective.</p>  <p
data-el="text"><b>Authenticate your corporate email domain.</b></p><p
data-el="text">This blocks the delivery of messages from fraudsters pretending to be a member of your organization. Check with your email service provider, like Microsoft Outlook or Google, to get started. You should also attach warnings to emails coming from external senders or containing links or attachments — both Outlook and Gmail offer this feature.</p><p
data-el="text"><b
style="color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif;">Clarify what employees should do if they click a suspicious link or attachment.</b></p><p
data-el="text">If people are afraid to report or don’t know how, they probably won’t do it. Make sure reporting procedures are outlined in your company’s security policy. Kalember recommended automated reporting, which lets employees report malicious email with the click of a button.</p><p
data-el="text"><b
style="color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif;">Leave room for human error.</b></p><p
data-el="text">Somebody is always going to open the phishing email promising adorable kitten pictures. So consider hedging your bets with anti-phishing technology like remote browsers, in which URLs open not in a traditional browser, but in a special environment in the cloud that disappears as soon as you’re done with it. That way, no matter what the URL contains, it can’t compromise the employee.</p><p
data-el="text"><b
style="color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif;">Conduct ongoing security testing.</b></p><p
data-el="text">Attackers use malicious files and compromised business email accounts to install ransomware on company computers and networks, but software vulnerabilities are another way in. Your company’s IT team — or a third party — should be actively looking for threats on your network.</p><p><p></p>]]></content:encoded> </item> <item><title>How does 5g work?</title><link>https://www.redtreecommunications.com/2021/05/27/how-does-5g-work/</link> <dc:creator><![CDATA[summest]]></dc:creator> <pubDate>Thu, 27 May 2021 16:29:58 +0000</pubDate> <category><![CDATA[Networking]]></category> <category><![CDATA[Smart Phones]]></category> <guid
isPermaLink="false">https://www.redtreecommunications.com/?p=19140</guid><description><![CDATA[With 5G, signals run over new radio frequencies, which requires updating radios and other equipment on cell towers. There are three different methods for&#160;building a 5G network, depending on the type of assets a wireless carrier has: low-band network (wide coverage area but only about...]]></description> <content:encoded><![CDATA[<p>With 5G, signals run over new radio frequencies, which requires updating radios and other equipment on cell towers. There are three different methods for&nbsp;<a
target="_blank" rel="noreferrer noopener" href="https://www.cnn.com/2019/08/09/tech/5g-review/index.html">building a 5G network</a>, depending on the type of assets a wireless carrier has: low-band network (wide coverage area but only about 20% faster than 4G), high-band network (superfast speeds but signals don’t travel well and struggle to move through hard surfaces) and mid-band network (balances speed and coverage).</p><p>Carriers building superfast 5G networks must install tons of small cell sites — about the size of pizza boxes — to light poles, walls or towers, often in relatively small proximity to one another. For that reason, superfast networks are mostly being deployed city by city. Eventually, most US carriers will have a mix of the different network types that will enable both broad coverage and fast speeds.</p><p>Just how fast will download speeds be?</p><h3 class="wp-block-heading">Just how fast will download speeds be?</h3><p>The fastest 5G networks are expected to be at least 10 times faster than 4G LTE, according to wireless industry trade group GSMA. Some experts say they could eventually be 100 times faster. That’s fast enough to download a two hour movie in fewer than 10 seconds, versus around 7 minutes with 4G. Actual download speeds will depend on a number of factors, including location and network traffic.</p><h3 class="wp-block-heading">How can you use it?</h3><p>In order to connect to and get the benefits of a 5G network, consumers have to have 5G-enabled devices. Samsung, Motorola, Huawei, LG, OnePlus and several other device makers have released 5G phones. Apple is widely expected to release a&nbsp;<a
target="_blank" rel="noreferrer noopener" href="https://www.cnn.com/2019/12/02/tech/apple-5g-iphones-2020/index.html">5G iPhone later</a>&nbsp;in fall 2020. Some companies — including manufacturers and the NFL — are also working with carriers to install personal 5G networks so they can reap the benefits without waiting for the nationwide rollout.</p><h3 class="wp-block-heading">Are there drawbacks?</h3><p>Significant adoption of 5G is going to take years — industry trade group GSMA estimates that by 2025, around half of mobile connections will be 5G (the rest will be older tech, like 4G and 3G). There are also concerns among regulators and others about the&nbsp;<a
target="_blank" rel="noreferrer noopener" href="https://www.cnn.com/videos/business/2019/07/23/huawei-cell-phone-avlon-reality-check-newday-vpx.cnn">security of 5G</a>, especially since crucial technologies such as self-driving cars and healthcare systems will be built on top of the network.</p> ]]></content:encoded> </item> <item><title>UNDERSTANDING BANDWIDTH</title><link>https://www.redtreecommunications.com/2021/03/01/understanding-bandwidth/</link> <dc:creator><![CDATA[summest]]></dc:creator> <pubDate>Mon, 01 Mar 2021 19:24:03 +0000</pubDate> <category><![CDATA[Networking]]></category> <guid
isPermaLink="false">https://www.redtreecommunications.com/?p=18993</guid><description><![CDATA[If you&#8217;ve ever tried to drink a milkshake through a straw, you understand bandwidth. Drinking a soda through a straw is simple. Soda is just water with bubbles. It&#8217;s not thick, and you don&#8217;t need to apply much suction to quench your thirst. But try...]]></description> <content:encoded><![CDATA[<div
data-elementor-type="wp-post" data-elementor-id="18993" class="elementor elementor-18993" data-elementor-post-type="post"> <section
class="elementor-section elementor-top-section elementor-element elementor-element-1ebc5bf6 elementor-section-boxed elementor-section-height-default elementor-section-height-default parallax_section_no qode_elementor_container_no" data-id="1ebc5bf6" data-element_type="section"><div
class="elementor-container elementor-column-gap-default"><div
class="elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4a1c9f33" data-id="4a1c9f33" data-element_type="column"><div
class="elementor-widget-wrap elementor-element-populated"><div
class="elementor-element elementor-element-3a687a2e elementor-widget elementor-widget-text-editor" data-id="3a687a2e" data-element_type="widget" data-widget_type="text-editor.default"><div
class="elementor-widget-container"><p>If you&#8217;ve ever tried to drink a milkshake through a straw, you understand bandwidth. Drinking a soda through a straw is simple. Soda is just water with bubbles. It&#8217;s not thick, and you don&#8217;t need to apply much suction to quench your thirst. But try to drink a thick milkshake through that same straw and you might have problems. Either you have to suck much harder or you need a bigger straw.</p><p>The data we transmit on the internet is like that. Some things, like a simple email text message, require very little bandwidth because there&#8217;s not much data. But a 4K video stream requires a lot of bandwidth because the data files are so large.</p><p>Sure, you could theoretically watch a 4K video stream with any bandwidth capacity (even dial-up), but you&#8217;d have to download the entire file first, which could take days. If you want to just click and watch, the internet pipe needs to be wide enough to accommodate all that data.</p><h3 class="wp-block-heading">THESE DAYS, IT&#8217;S ALL ABOUT THE VIDEO</h3><p>So let&#8217;s jump into the specifics. In our new pandemic-driven normal, it&#8217;s all about the video. Emails and basic web surfing consume a relatively small amount of bandwidth. Photos and music consume more, as do games. But it&#8217;s video that&#8217;s the big bandwidth hog. So that&#8217;s what we&#8217;re going to look at in this guide.</p><p>Bandwidth is generally measured in megabits per second, written as Mbps (with a lower-case &#8220;b&#8221;). That&#8217;s millions of bits per second. As you can see in the following chart, Netflix says the absolute minimum bandwidth it needs is 0.5Mbps. That will be for heavily buffered, very low resolution video.</p><figure
class="wp-block-image"><img
decoding="async" src="https://www.zdnet.com/a/hub/i/2020/08/18/819bfeaf-1c48-4252-9b1c-05a7b59626b2/slide-1.jpg" alt="slide-1.jpg" /></figure><p>By contrast, to watch a movie streamed in glorious 4K, your connection will need 20Mbps. That means your pipe needs to be able to send 20 million bits in one second. As you can see, different levels of resolution require different amounts of bandwidth.</p><p>Fortunately, Netflix and YouTube (and most other streaming services) either let you specify the quality of video you&#8217;re watching (and, by extension, the bandwidth you use) or automatically throttle your video based on your existing bandwidth.</p><p>In a world where you&#8217;re probably only watching one Netflix stream and possibly a YouTube video at a time, this works fine. But when you and your spouse and your kids must all be online at once, all using video, the requirements change.</p></div></div></div></div></div> </section></div> ]]></content:encoded> </item> </channel> </rss>