mkdir Lucio
@mkdir_lucio
3/ We cyber folks LOVE switches (segmentation) and routers (firewalling). We HATE hubs (they violate all the rules). Your routers remain at the gate and your switches behind the closet. Simple. What is your go-to "legacy" device anecdote? #CyberSecurity #IT
2/ Switches: The smart sorters of your LAN. They learn where devices are and talk directly to them. That is efficiency. That is security (especially with VLANs!). Routers: The smart gatekeepers. They connect different networks and make decisions at the edge.
1/ Let's talk about the new and old school of network gear. Short thread! ???? Hubs: Dumb. Sends broadcasts to everyone. Security nightmare. If you see one, rip it out. Seriously. Bridges: A little smarter, but still primitive. The ancestor of the switch. #Networking #Tech
2/ Media Converters: Those unassuming heroes (fiber<>copper conversion) must be in LOCKED closets. Their purpose is vital but low-profile. Lock 'em up and hide them. Physical security is network security. #Networking #IT
3/ Rule of thumb: If it can be accessed, then it shouldn't be in a public area. Location, location, location! What's the most misplaced device you've ever encountered? (I once found a core switch under a reception desk! ????) #Tech #InfoSec
Where you put your network hardware is a security decision? Wireless APs: Nowhere for coverage. Put them in to keep public signal bleed in. You don't want to advertise your network to the parking lot! #Cybersecurity #WiFi
3/ My take? An un-portal'd guest network is a huge risk. And an un-surveyed portal is an illusion of security. Get them both right. What's the most shocking guest WiFi installation you've ever encountered? (The good, the bad, the ugly!) #IT #Tech
2/ But a nice portal is pointless if your WiFi signal is poor or holey. That's where a Site Survey comes in. ????️ You wouldn't build a sandcastle. Don't build your network without surveying your airspace first. Coverage + Security = An ironclad setup. #CyberSecurity #WiFi
1/ Ever get to "Free WiFi" and land on a login screen? That's a Captive Portal. For companies, it's NOT about getting a password. It's your first line of cybersecurity defense. → Segregates guests from your regular network → Monitors who's on → Enforces policies Essential!
Wi-Fi terms, SSID: The name you connect to. BSSID: The true MAC address of the AP. Its fingerprint. WPA2/WPA3: The encryption that keeps your data safe. Channels: Highway lanes. Picking the right one avoids traffic jam. Smart setup = Safe network + Happy users. #WiFi #TechTalk
Wi-Fi: It's not magic, it's radio waves! Its deployment must be secured. Your cheat sheet is here: ➡️WPA3: Use it. No exceptions! ➡️SSID: Your network's name. Hiding it does NOTHING for security. ➡️BSSID: Your access point's unique MAC. ➡️Band Steering: fast 5GHz band. #WPA3
Think like a hacker: walk into an office, plug into the wall. Are you in? If Port Security isn't turned on, probably YES. It's Layer 2 security, Your switch port bouncer. "Your MAC address not on the list? You're not getting in." #Cybersecurity #Networking #Hacking #ITAdmin
Double the ports, double the fun? How about 2, 4, or 8 links acting as ONE. That's EtherChannel. It's a superhighway for your switch-to-switch traffic. ???? Redundancy More bandwidth Easier STP topology #Cybersecurity #Networking #IT #TechTip
Networking myth: More links = more better. STP is the behind-the-scenes hero that keeps your network from melting down. But which one? STP: The slow OG. RSTP: The fast upgrade we've all been waiting for. PVST+: Lets you tune each VLAN like a boss. #Networking #Cybersecurity #IT
3/ Trunking (802.1Q) is the mechanism by which switches send all those VLANs to one another. It's VLAN highway. ????️ This is Network Segmentation 101. It stops breaches from propagating. What's not to love? #CyberSecurity #Networking #VLAN
1/ A flat network is a happy playground. for attackers. ???? 2/ VLANs are your first line of defense. They enable you to divide one physical network into various logical ones. HR in one. Finance in another. IoT devices isolated.
2/ SMB is the method through which Windows systems share files. And it's also been a goldmine of vulnerabilities. ⛏️???? Don't make it world-readable. Please. Segment your networks! #CyberSecurity #Networking #SysAdmin
1/ Why must all my computers be the same time? Because NTP requires so. Security logs are useless without time sync. Forensics is hell. Auth breaks. Hackers delight in messing with time. .........
>> SSH is my best friend. It lets me connect to devices remotely via a very heavily encrypted tunnel. Safe and sound. >> SNMP is great for checking device health. but versions 1 & 2c are a security nightmare. Passwords sent in plain text!
The most important letter in tech is S. HTTP vs HTTPS FTP vs FTPS See the pattern? That 'S' is for Secure. It means everything is encrypted. Without it, you're sending your passwords on a postcard for everyone to read. Never, ever shut it down. #CyberSecurity #InfoSec #Encryption
United States Trends
- 1. Caleb 53.8K posts
- 2. Bears 77.3K posts
- 3. Packers 63.9K posts
- 4. #GoPackGo 11.3K posts
- 5. Jeff Kent 4,620 posts
- 6. Ben Johnson 6,360 posts
- 7. Notre Dame 165K posts
- 8. Nixon 13.8K posts
- 9. DJ Moore 2,935 posts
- 10. Raiders 34.1K posts
- 11. Shedeur 109K posts
- 12. Browns 78.8K posts
- 13. Kmet 1,493 posts
- 14. ESPN 120K posts
- 15. Parsons 6,512 posts
- 16. Mattingly 2,893 posts
- 17. Ravens 50.7K posts
- 18. Josh Jacobs 4,324 posts
- 19. Stefanski 32.3K posts
- 20. #ChiefsKingdom 2,345 posts
Something went wrong.
Something went wrong.