MIR3 Blog | Best Practices and Thought Leadership

Mass Notification & Emergency Notification Software

SupportTraining

Blog

Notification Blog

Apr 14
2017
The Importance of Enhanced System Security: A Look at the Recent Weather Alarm Hacking Scandal

The Importance of Enhanced System Security: A Look at the Recent Weather Alarm Hacking Scandal

The city of Dallas, Texas boasts 156 emergency weather sirens throughout the entire city charged with warning residents when there is an imminent threat from a tornado or other severe weather. On Friday, April 7, 2017 Dallas residents were startled awake when every siren in the city was activated at the same time. The sirens blared for more than an hour and half before city officials were able to manually turn them off.... Read More »

Apr 7
2017
The cybersecurity principle of minimalism

The cybersecurity principle of minimalism

Here’s a short post, ideal for illustrating the simple but not always easy principle of minimalism: Whatever you have, chances are you don’t need it all. You don’t need all the data you may be asking for, or for that matter, giving out. Medical forms and even veterinary offices often ask for social security numbers, though there are few cases where a medical facility needs that information. Many forms ask for a driver’s... Read More »

Mar 23
2017
The cybersecurity principle of the locked door

The cybersecurity principle of the locked door

You lock your home—now lock your network. This means having a reliable and secure data center and following basic safety rules, like locking down ports, shutting off services, removing rights and privileges when no longer justified, and using firewalls. You’ll also need host and network intrusion detection and prevention (IDS/IPS) as well as physical access controls such as badge, PIN pad and biometrics etc., to ensure you let only the right traffic and... Read More »

Mar 16
2017
Cybersecurity principle #3: Beware the shiny and new

Cybersecurity principle #3: Beware the shiny and new

This post is short and sweet, but very important. Most of us are drawn to new tech toys, but at the same time, we resist change. We want the latest and greatest, and yet a part of us resists the added security responsibility that comes with new technology. This is something we need to be very aware of in the cybersecurity sphere. The shiny, new rules are basic: If you installed it, update... Read More »