“My computer’s not working!” “I can’t connect to the internet!” “My emails aren’t sending!” You’re probably used to hearing common requests and complaints like these from end users. It’s our job to take these issues, troubleshoot them, bring them to root cause, and get the user back up and running as quickly as possible.
When it comes to cybersecurity, the landscape is constantly changing: the number of cyberattacks is always on the rise, the attacks themselves are becoming more sophisticated, and there’s a serious skills shortage in the industry. There’s a lot to learn about cybersecurity if you want to keep up and keep your users protected.
As a network evolves over time, new devices are added, old devices begin to show their age, and some devices are completely forgotten about. It’s a natural consequence of mergers, upgrades, staff turnovers, and other common occurrences that contribute to redundancy or excess complexity in IT infrastructure.
Syslog is a good thing. It’s a standard network based logging protocol that works on an extremely wide variety of different types of devices and applications, allowing them to send free text-formatted log messages to a central server. Essentially every device on your network—whether it’s a storage box or a server, a switch or a firewall—likely has a syslog agent you can use to send messages to a common central location.