Network Security Shouldn’t be a Science Experiment

Posted on May 23, 2018 7:20:00 AM

As previously discussed, the days of installing a firewall with antivirus and calling your network secure are long gone. Thanks to an influx of connected devices from numerous sources and an expanding list of network-dependent systems (hello, temperature control and sprinklers!), the likelihood of a network breach is much higher than ever (and also more difficult to detect).

read more »

3 Surprising Areas You Might Be Overlooking in Network Security

Posted on May 16, 2018 11:30:00 AM

In days gone by, educational IT departments followed the antivirus + firewall = network security formula. Unfortunately, those days are over. Because of the advent of cloud technology and the increased utilization of your network for mission-critical applications, the network security architecture discussion is no longer optional. The conversation must happen, period.

read more »

The Surprising Key to Campus Safety

Posted on Apr 18, 2018 7:26:19 AM


As we’ve mentioned, when we discuss campus safety with district leadership, we frequently hear about the list of technology that has been purchased and installed. One key to campus safety that’s not typically categorized as a safety measure but which significantly contributes to the security of your students, faculty, and organization as a whole is the expanding technology involving network...

read more »

Network Security is Like Building a Car

Posted on Sep 29, 2017 8:39:43 AM

How is developing a network security architecture like builidng a car? DGI's Vice President, Jason Eatmon, explains in this video:

read more »

Make your Cloud Video Management System More Secure

Posted on Aug 31, 2017 9:20:26 AM

As discussed in our last blog, leveraging a Video Management System (VMS) that is both cloud-based and secure can come with a few challenges. Some organizations might even be hesitant to use a cloud VMS, solely because of some of the additional security concerns. The good news is that cloud VMS can be safely integrated into your security strategy, and can also be a huge asset to your...

read more »

Security Breaches: The London Plagues of Technology

Posted on Jan 19, 2017 10:40:40 AM

Security has been around forever. Centuries ago, there were villages and castles that needed protection, so the citizens built a wall. And then as technology improved, they would build a higher wall, and then they used stones instead of sticks. After that came the moat, then spikes on the wall, then crocodiles in the moat. Meanwhile, with everyone paying attention to this wall and making it as...

read more »

The Compass of IT Security

Posted on Oct 27, 2016 9:32:59 AM

We’ve already discussed several reasons why historical IT security strategies are no longer effective for the advanced practices of cyber criminals today. We’d like to dig a bit deeper into one of the biggest challenges that IT security faces today: the many directions that hackers can take to infiltrate the network. As an IT professional, you are responsible for ensuring that threats are...

read more »


Posted on Oct 20, 2016 1:43:01 PM

A few weeks ago some employees happened to be looking for a thumb drive to flash some firmware on a TV. It seemed like a completely legitimate request, considering their job role and the technology they were working with. Someone happened to direct them to me, and my response was “NOOOOOOOOOOOOOOOOOOOOO!” They both looked at me like I was crazy until I explained my reaction to them. Here’s why...

read more »

Network Security: Why Historical Solutions No Longer Work

Posted on Oct 6, 2016 12:00:47 PM

There’s a lot of discussion and philosophy about network security, but the bottom line is that the question remains: How do you actually secure your network? Most organizations use one or more technologies that address the network edge and the end point of the system. The problem with this strategy is that while it may have been effective historically, threats today are far more advanced and...

read more »

Gone Phishin’

Posted on Aug 25, 2016 7:43:31 PM

DGI recently experienced a phishing attempt that served as a good reminder to us that those bad actors will attempt to infiltrate any organization – even ones with extensive experience in technology security.

read more »

Subscribe to Email Updates

Subscribe to Email Updates

Recent Posts