{"id":1373,"date":"2016-09-07T12:41:00","date_gmt":"2016-09-07T12:41:00","guid":{"rendered":"http:\/\/www.mtin.net\/blog\/?p=1373"},"modified":"2016-09-07T12:41:00","modified_gmt":"2016-09-07T12:41:00","slug":"homeland-security-us-cert-e-mail-on-network-infrastructure","status":"publish","type":"post","link":"http:\/\/www.mtin.net\/blog\/homeland-security-us-cert-e-mail-on-network-infrastructure\/","title":{"rendered":"Homeland Security US-Cert e-mail on Network infrastructure"},"content":{"rendered":"<p>A few days ago Homeland Security published an e-mail on threats to network devices and securing them. \u00a0Rather than cut and paste I exported the e-mail to a PDF. Some good best practices in here.<\/p>\n<p><a href=\"http:\/\/www.mtin.net\/blog\/wp-content\/uploads\/2016\/09\/TA16250A-The-Increasing-Threat-to-Network-Infrastructure-Devices-and-Recommended-Mitigations.pdf\">TA16250A The Increasing Threat to Network Infrastructure Devices and Recommended Mitigations<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A few days ago Homeland Security published an e-mail on threats to network devices and securing them. \u00a0Rather than cut and paste I exported the e-mail to a PDF. Some good best practices in here. TA16250A The Increasing Threat to Network Infrastructure Devices and Recommended Mitigations<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[67,128,17,274,156],"tags":[359,357,100,334,108,356,243,358],"jetpack_publicize_connections":[],"aioseo_notices":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p6VLMf-m9","jetpack-related-posts":[{"id":1798,"url":"http:\/\/www.mtin.net\/blog\/wpa-is-not-encrypting-your-customer-traffic\/","url_meta":{"origin":1373,"position":0},"title":"WPA is not encrypting your customer traffic","author":"j2sw","date":"September 11, 2017","format":false,"excerpt":"There was a Facebook discussion that popped up tonight about how a WISP answers the question \"Is your network secure?\" There were many good answers and the notion of WEP vs WPA was brought up. In today's society, you need end-to-end encryption for data to be secure. An ISP has\u2026","rel":"","context":"In &quot;Networking&quot;","block_context":{"text":"Networking","link":"http:\/\/www.mtin.net\/blog\/category\/networking\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.mtin.net\/blog\/wp-content\/uploads\/2017\/09\/download.jpg?fit=236%2C213&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":1152,"url":"http:\/\/www.mtin.net\/blog\/calea-and-the-isp\/","url_meta":{"origin":1373,"position":1},"title":"Calea and the ISP","author":"j2sw","date":"May 6, 2016","format":false,"excerpt":"The Communications and Law Enforcement Act (CALEA) passed in 1994 is a piece of legislation every U.S. ISP should know about and be in compliance with. \u00a0If for the simple fact the government can levy heavy fines if you aren't compliant. For those of you wanting some background please follow\u2026","rel":"","context":"In &quot;Networking&quot;","block_context":{"text":"Networking","link":"http:\/\/www.mtin.net\/blog\/category\/networking\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1789,"url":"http:\/\/www.mtin.net\/blog\/everything-you-wanted-to-know-about-ntp\/","url_meta":{"origin":1373,"position":2},"title":"Everything you wanted to know about NTP","author":"j2sw","date":"September 6, 2017","format":false,"excerpt":"Network Time Protocol (NTP) is a service that can be used to synchronize\u00a0time on network connected devices. \u00a0 Before we dive into what NTP is, we need to understand why we need accurate time. The obvious thing is network devices need an accurate clock. \u00a0Things like log files with the\u2026","rel":"","context":"In &quot;Networking&quot;","block_context":{"text":"Networking","link":"http:\/\/www.mtin.net\/blog\/category\/networking\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.mtin.net\/blog\/wp-content\/uploads\/2017\/09\/s_ntp00062.jpg?fit=624%2C470&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":2225,"url":"http:\/\/www.mtin.net\/blog\/its-day-like-this\/","url_meta":{"origin":1373,"position":3},"title":"It&#8217;s day like this&#8230;","author":"j2sw","date":"April 23, 2018","format":false,"excerpt":"Today a major vulnerability was released to the public from a well-known vendor.\u00a0 All of our consulting customers have been notified\u00a0of this critical\u00a0update.\u00a0 Those whom\u00a0we manage the network for already have a mitigation plan in place and a course of action. If you are not a regular customer ask us\u2026","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"http:\/\/www.mtin.net\/blog\/category\/security\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1456,"url":"http:\/\/www.mtin.net\/blog\/networking-foundations\/","url_meta":{"origin":1373,"position":4},"title":"Networking foundations","author":"j2sw","date":"December 12, 2016","format":false,"excerpt":"In an article earlier today, I wrote about certifications and the ISP. \u00a0The biggest area I see folks go wrong when it comes to networking is having a good understanding of design. One of the analogies I like to use is building a house. \u00a0 You have several key roles\u2026","rel":"","context":"In &quot;Networking&quot;","block_context":{"text":"Networking","link":"http:\/\/www.mtin.net\/blog\/category\/networking\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":2176,"url":"http:\/\/www.mtin.net\/blog\/mtin-announces-isp-security-scan-service\/","url_meta":{"origin":1373,"position":5},"title":"MTIN announces ISP security scan service","author":"j2sw","date":"March 28, 2018","format":false,"excerpt":"Are you an ISP wanting to know security scans of your network? MTIN now has some options to\u00a0keep your\u00a0network secure. Contact us for scans on your network to look for open ports and other vulnerabilities on your network that could be exploited. MTIN\u00a0also offers server checkup services.","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"http:\/\/www.mtin.net\/blog\/category\/security\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_likes_enabled":true,"_links":{"self":[{"href":"http:\/\/www.mtin.net\/blog\/wp-json\/wp\/v2\/posts\/1373"}],"collection":[{"href":"http:\/\/www.mtin.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.mtin.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.mtin.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.mtin.net\/blog\/wp-json\/wp\/v2\/comments?post=1373"}],"version-history":[{"count":1,"href":"http:\/\/www.mtin.net\/blog\/wp-json\/wp\/v2\/posts\/1373\/revisions"}],"predecessor-version":[{"id":1375,"href":"http:\/\/www.mtin.net\/blog\/wp-json\/wp\/v2\/posts\/1373\/revisions\/1375"}],"wp:attachment":[{"href":"http:\/\/www.mtin.net\/blog\/wp-json\/wp\/v2\/media?parent=1373"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.mtin.net\/blog\/wp-json\/wp\/v2\/categories?post=1373"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.mtin.net\/blog\/wp-json\/wp\/v2\/tags?post=1373"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}