Blog
ASR 9000 Ethernet Line Cards -TR and -SE Comparison Table and Common Error Messages
IntroductionPrerequisitesRequirementsComponents UsedBackground InformationTyphoon, Tomahawk based -TR and -SE Line cards Resources
Comparison TableASR 9001 Built-in PortsPacket Transport Optimized (-TR) Line cards Common QoS
Error messagesASR 9000 Series Line Card TypesThe information in this document was created from the devices in a specific lab environment. All the devices used in this document started with a cleared (default) configuration. If your network is live, ensure that you understa
…
Feb 7th 2023
What Role Does Cybersecurity Play In Your Physical Security?
Today, very few organizations depend solely on one kind of security measure to secure their organization and cover their assets. Most companies employ security systems that feature physical security protocols as well as cybersecurity protocols. However, to correctly implement physical security measures and cybersecurity measures side by side, you need to understand the role that cybersecurity plays in physical security for businesses.
A basic understanding of the relationship
…
Dec 23rd 2022
Why Organizations Should Still Care About BYOD
The conversation on bring your own device (BYOD) in the workplace has been going on for a while and it’s obviously more a given in some sectors than in others. Opinions among security experts on whether or not BYOD is a good idea depend on who you talk to. What is clear is that organizations may want to at least consider a BYOD program. Why? Because not only do many employees use their personal devices for work anyway, studies show that they’re more productive when they’re allowed to.Though t
…
Dec 23rd 2022
Social Engineering Simulation Testing Tips
Do you know who is calling you? In many cases, employees rely on caller ID or a familiar name to allow callers to build trust and potentially exploit them. Vishing (or social engineering) is a practice where verbal communication is used to deceive a potential victim. Similar to phishing, the aim is to compel an individual to either provide information or take an action, which can be used for network penetration or identity theft. The problem is so pervasive, the IRS listed phone scams as n
…
Dec 23rd 2022
What is physical security?
Physical security is the protection of personnel, hardware, software, networks and data from physical actions and events that could cause serious loss or damage to an enterprise, agency or institution. This includes protection from fire, flood, natural disasters, burglary, theft, vandalism and terrorism.Physical security is often overlooked -- and its importance underestimated -- in favor of more technical threats such as hacking, malware, and cyberespionage. However, breaches of physical sec
…
Dec 23rd 2022