Secure Designs -Div of ADTCS without log
  • HOME

  • ABOUT

  • SERVICES

  • PRODUCTS

  • RESELLERS

  • TESTIMONIALS

  • CONTACT

  • More

    Quick Links

    Company

    Managed Security Services

    Small organizations

    Large Distributed organizations

    Private Label Managed Security for ISPs

    K-12 and E-rate

    Vulnerability Scanning

    Advanced Premium Email Security

    ADT-IQ (SIEM)

    Technology Partners

    Contact

    Telephone:

    Sales 800-729-1316

    Main Office Number 336-232-5990

    Main Fax Number 336-232-5991

    ​

    Email:

    sales@securedesigns.com

    webmaster@securedesigns.com

    ​

    Location:

    Secure Designs/ADT Cybersecurity

    301 North Elm Street

    Suite 550

    Greensboro, NC 27401

    ​

    Copyright  2018 by Secure Designs, a division of ADT Cybersecurity.

     

    • LinkedIn Social Icon
    • Facebook Social Icon
    • Twitter Social Icon
    • YouTube Social  Icon

    Follow Us

    ABOUT US

    About Secure Designs

    ​

    Mission Statement

    ​

    Management Team

    ​

    Careers

    ​

    Data Center

    ​

    News & Events

    The ‘Internet of Insecure Things’, Ron Culler on This Week in Enterprise Tech

     

     

     

     

     

     

     

     

     

     

     

    Ron Culler explains the ‘Internet of Insecure Things’ in an interview with This Week in Enterprise Tech, the popular web TV show hosted by tech industry veterans Robert Ballacer, Curtis Franklin and Brian Chee.

     

    Small businesses as well as schools and other organizations that hold sensitive data are a prime target for cyber criminals because of their general lack of IT resources.

     

    The Internet of Things (think anything from video cameras to thermostats) brings a new dimension of vulnerabilities to networks who are already facing new threats daily to existing perimeter security. In this video, Ron joins other security industry Illuminati and discusses dangers—including dealing with non-IT literate suppliers and ill-advised system connections—and provides direction on how to preemptively address issues to limit exposure.

     

    Ron and Robert also discuss examples including the poor design that led to the infamous Jeep hack.

    Please reload