Visiting The Internet of Things

The Internet of Things (IoT) is how analog systems (people) will thrive in a digital world.  People are amazing creatures.  Our analog brain is wired for all sorts of human things.  Often we can recognize loved ones with just a word or a single movement.  We can tell if people are being honest or deceptive by quickly analyzing complex facial and body movements.  We are constantly monitoring our environment and respond quickly to subtle changes.  We receive continuous input from our senses, organize vast amounts of sensory data and make continuous decisions based on millions of pieces of analog data. We are miraculous, wonderfully analog but have trouble in a digital world. The term The Internet of Things coined by Kevin Ashton in 1999 has become a widely-used to describe things that can be  cataloged by computers.  Digital systems use discrete data in processing.  In computers, we … [Read more...]

LAN Systems Named to the Bulldog 100: Fastest Growing Bulldog Businesses Class of 2013

LAN Systems was honored on January 26, when the UGA Alumni Association announced the rankings of the 2013 Bulldog 100: Fastest Growing Bulldog Businesses at a celebration in Atlanta. LAN Systems, helmed by 2006 UGA graduate Mary Hester, ranks as this year’s 84th fastest growing Bulldog business.  The firm specializes in IT Solutions and Services for growing businesses. “This is an incredible honor and a proud moment for all of us at LAN Systems,” said Mary Hester. “We are fortunate to have received many awards over the years, but the Bulldog 100 is our most coveted award to date.” The Atlanta CPA firm, Warren Averett + GH&I, has annually partnered with the UGA Alumni Association since the inception of the program four years ago to verify the information that was submitted by each nominated company.  Warren Averett + GH&I then ranked the companies based on compounded … [Read more...]

Your Package Has Been Returned and Your SSL Certificate is Suspended!

We have a very good Spam filter, but still every now and then a phishing email will slip through.  My business email is easy to find so I get  a wide assortment of unsolicited emails. This week I received a deviation on a scam that has been around for years - your package was returned and click this link to get it.  I also received one that my LogMein SSL Certificate had been suspended - click here to fix. Of course, the links are malicious and at least, would come with some irritating pop-ups and at worse, steal your identity, seize your system and ruin your computer. These exploits are designed to cause an immediate emotional response that will make you click before your think.  Because if you look closer, the fraud is apparent.  The mail and parcel carriers do not typically use email for package routing information although some will let you elect mobile or email notification.  The … [Read more...]

Honeypots and SCADA Systems

Guest Blog by Rusty O’Neal System Specialist/SCADA Admin, Canoochee EMC and Secretary, GEMC Distribution Transmission Automation Group (DTAG) "A honeypot consists in an environment where vulnerabilities have been deliberately introduced in order to observe intrusions and attacks"(Pouget & Dacier, 2004, p. 2). The great thing about honeypots is that you can put them into any environment to observe malicious traffic. This could be used to monitor traffic locally or a wide area. Honeypots have been used for over twenty years now to watch for such traffic. The great thing about using a honeypot is that it is used to set a trap to detect, deflect, and in some manner counteract unauthorized access. A honeypot looks just like any other network including computers, data, and a network site that appears to be part of the corporate network, but is actually put in place to be closely … [Read more...]