Optigo Networks Blog

Blog Image

IoT News: Simplifying cybersecurity

 

Hi there! Welcome to your weekly roundup of IoT news. My name’s Natalie, and I’m a newbie to the Internet of Things and smart buildings. I don’t have a tech degree, and Wireshark's a mystery to me. But I do have a fresh perspective that you won’t see from 20-year (or more) veterans of the field.

Each week, I’ll share interesting news from the industry. This time, learn about IoT trends in 2018; why governments should make more use of IoT; and three ways developers can improve cybersecurity.

Blog Image

IoT News: HVAC for humanity

 

Hi there! Welcome to your weekly roundup of IoT news. My name’s Natalie, and I’m a newbie to the Internet of Things and smart buildings. I don’t have a tech degree, and Wireshark's a mystery to me. But I do have a fresh perspective that you won’t see from 20-year (or more) veterans of the field.

Each week, I’ll share interesting news from the industry. This time, learn why SMBs have an edge on cybersecurity, how to build smarter cities, and what Carrier’s bringing to Habitat for Humanity.

Blog Image

Your guide to capturing MS/TP

 

Do you dread the letters “MS/TP”? If you’ve ever had to capture MS/TP traffic, you probably do. It’s a complicated process, and can mean a lot of trial and error. You can’t ignore MS/TP traffic and hope for the best, though. Eventually you have to roll up your sleeves, pull out your USB, and dig in.

Blog Image

Capturing packets in Wireshark

 

Does the thought of running Wireshark make you nervous? Wireshark’s got a reputation for being more than a bit challenging. With a little practice, though, you can get so much value out of the program. The first step is to capture, so here’s our step-by-step guide!

Blog Image

IoT News: Senators securing IoT

 

Hi there! Welcome to your weekly roundup of IoT news. My name’s Natalie, and I’m a newbie to the Internet of Things and smart buildings. I don’t have a tech degree, and Wireshark’s a mystery to me. But I do have a fresh perspective that you won’t see from 20-year (or more) veterans of the field.

Blog Image

Five ways to securely analyze BACnet data

 

You’ve spotted a problem on your BACnet network. Devices are dropping like flies, with no apparent explanation. You need to get a packet capture (pcap) if you want to dig in and untangle what’s happening. But the IT department’s worried what sensitive information could be leaked if you pull any data. You’re at a stand-off, with conflicting needs.

Trying to convince your IT department that you can safely pull pcap files? Here are five ways to keep IT out of your OT.

Blog Image

How to find and solve duplicate networks

 

Controllers are offline. You try resetting your BACnet router to get them back on. It works, and the controllers come online… But then the controllers off of a different router go offline, and you have to solve the problem all over again.

If you feel like you’re juggling to keep all your BACnet devices online, a duplicate network might be the culprit. We’re here to help you figure out how it happens and what you can do to fix it.

Blog Image

How to filter for BACnet traffic

 

Is your IT department super security-conscious? Maybe they’ve asked you to start filtering and scrubbing all your packet captures (pcaps), and you don’t know where to begin?