<?xml version="1.0" encoding="utf-8"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<atom:link href="https://litecom.net/blog/x5feed.php" rel="self" type="application/rss+xml" />
		<title><![CDATA[Business Technology Wiki & IT Solutions Guide]]></title>
		<link>https://litecom.net/blog/</link>
		<description><![CDATA[Explore Litecom’s business technology wiki covering VoIP, IT support, network solutions, and key terms to help your business understand modern technology.]]></description>
		<language>EN</language>
		<lastBuildDate>Sun, 12 Apr 2026 14:32:00 -0700</lastBuildDate>
		<generator>Incomedia WebSite X5 Pro</generator>
		<item>
			<title><![CDATA[Your Router Is a Security Risk—Here’s How to Fix It]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=Network_Engineering"><![CDATA[Network Engineering]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_000000024"><div><b>Your Router Is a Security Risk—Here’s How to Fix It</b></div> <div>The Hidden Threat Inside Your Network</div> <div>Most businesses don’t think twice about their router.</div> <div>It sits quietly in a closet or server room… until something goes wrong.</div> <div>But today, that router is one of the <strong data-start="421" data-end="480">biggest security vulnerabilities in your entire network</strong>.</div> <div><a href="https://Litecom.net/blog/?fcc-router-ruling" class="imCssLink">With new regulations from the Federal Communications Commission</a> and increasing warnings from the Cybersecurity and Infrastructure Security Agency, routers are now considered <strong data-start="650" data-end="693">high-risk entry points for cyberattacks</strong>.</div> <div>If your router isn’t properly secured, your entire business is exposed.</div> <hr data-start="769" data-end="772"> <div><b>What’s Really at Risk?</b></div> <div>A compromised router doesn’t just slow your internet—it can take down your entire operation.</div> <div>Here’s what’s on the line:</div> <ul data-start="926" data-end="1150"> <li data-section-id="cur6tn" data-start="926" data-end="964"> <strong data-start="928" data-end="964">VoIP phone systems going offline</strong> </li> <li data-section-id="v1svw2" data-start="965" data-end="1012"> <strong data-start="967" data-end="1012">Sensitive business data being intercepted</strong> </li> <li data-section-id="m7kc1w" data-start="1013" data-end="1054"> <strong data-start="1015" data-end="1054">Unauthorized access to your network</strong> </li> <li data-section-id="1uuis23" data-start="1055" data-end="1117"> <strong data-start="1057" data-end="1117">Ransomware attacks entering through open vulnerabilities</strong> </li> <li data-section-id="svwfy8" data-start="1118" data-end="1150"> <strong data-start="1120" data-end="1150">Complete business downtime</strong> </li> </ul> <div>And the worst part?</div> <div>Most businesses don’t even know they’ve been compromised until it’s too late.</div> <hr data-start="1252" data-end="1255"> <div><b>Why This Is Happening Now</b></div> <div>Cybercriminals are no longer targeting just computers—they’re targeting <strong data-start="1359" data-end="1377">infrastructure</strong>.</div> <div>Routers have become a primary attack point because:</div> <ul data-start="1432" data-end="1648"> <li data-section-id="wqcdm1" data-start="1432" data-end="1475"> They are often <strong data-start="1449" data-end="1475">outdated and unpatched</strong> </li> <li data-section-id="4mpjfx" data-start="1476" data-end="1532"> Many businesses use <strong data-start="1498" data-end="1532">default or weak configurations</strong> </li> <li data-section-id="owx8q6" data-start="1533" data-end="1582"> Firmware updates are <strong data-start="1556" data-end="1582">ignored or unavailable</strong> </li> <li data-section-id="c381rk" data-start="1583" data-end="1648"> Overseas manufacturing has introduced <strong data-start="1623" data-end="1648">supply chain concerns</strong> </li> </ul> <div>That’s exactly why new federal attention is being placed on router security.</div> <hr data-start="1728" data-end="1731"> <div><b>The Problem With “Set It and Forget It”</b></div> <div>If your router was installed and never touched again, you have a problem.</div> <div>Most off-the-shelf routers:</div> <ul data-start="1880" data-end="2010"> <li data-section-id="yyyfwf" data-start="1880" data-end="1910"> Are not actively monitored </li> <li data-section-id="18e4c89" data-start="1911" data-end="1957"> Do not receive consistent security updates </li> <li data-section-id="u8x469" data-start="1958" data-end="2010"> Are not configured for business-grade protection </li> </ul> <div>That means your network could already be vulnerable—right now.</div> <hr data-start="2076" data-end="2079"> <div><b>The Litecom Solution: Secure, Managed Network Infrastructure</b></div> <div>At Litecom, we don’t just install routers—we <strong data-start="2191" data-end="2254">secure, monitor, and manage your entire network environment</strong>.</div> <div>Here’s how we protect your business:</div> <div>1. Secure Router Deployment</div> <div>We install <strong data-start="2343" data-end="2401">business-grade, security-focused routers and firewalls</strong> configured to block threats before they reach your network.</div> <div>2. Continuous Monitoring</div> <div>Your network is monitored in real time to detect:</div> <ul data-start="2543" data-end="2618"> <li data-section-id="3gycwa" data-start="2543" data-end="2563"> Suspicious traffic </li> <li data-section-id="e8qwwe" data-start="2564" data-end="2594"> Unauthorized access attempts </li> <li data-section-id="1b47i4v" data-start="2595" data-end="2618"> Performance anomalies </li> </ul> <div>3. Firmware &amp; Security Updates</div> <div>We ensure your equipment is always:</div> <ul data-start="2692" data-end="2797"> <li data-section-id="10nam9u" data-start="2692" data-end="2706"> Up to date </li> <li data-section-id="1i4zch0" data-start="2707" data-end="2750"> Protected against known vulnerabilities </li> <li data-section-id="948if1" data-start="2751" data-end="2797"> Compliant with evolving security standards </li> </ul> <div>4. Network Hardening</div> <div>We lock down your infrastructure with:</div> <ul data-start="2864" data-end="2951"> <li data-section-id="15q4erp" data-start="2864" data-end="2891"> Advanced firewall rules </li> <li data-section-id="5xxy1c" data-start="2892" data-end="2920"> Segmented network access </li> <li data-section-id="1j0y51a" data-start="2921" data-end="2951"> Secure remote connectivity </li> </ul> <hr data-start="2953" data-end="2956"> <div><b>Built for Businesses That Can’t Afford Downtime</b></div> <div>If your business depends on:</div> <ul data-start="3039" data-end="3116"> <li data-section-id="n40wen" data-start="3039" data-end="3056"> Cloud systems </li> <li data-section-id="pe8ajs" data-start="3057" data-end="3074"> Remote access </li> <li data-section-id="1nyaf8b" data-start="3075" data-end="3098"> VoIP communications </li> <li data-section-id="breeik" data-start="3099" data-end="3116"> Customer data </li> </ul> <div>Then your router is not just hardware—it’s <strong data-start="3161" data-end="3196">mission-critical infrastructure</strong>.</div> <div>Litecom designs networks to be:</div> <ul data-start="3231" data-end="3278"> <li data-section-id="1acl0nz" data-start="3231" data-end="3243"> <strong data-start="3233" data-end="3243">Secure</strong> </li> <li data-section-id="1wlxdio" data-start="3244" data-end="3258"> <strong data-start="3246" data-end="3258">Reliable</strong> </li> <li data-section-id="zl838n" data-start="3259" data-end="3278"> <strong data-start="3261" data-end="3278">Fully managed</strong> </li> </ul> <div>So you can focus on running your business—not worrying about cyber threats.</div> <hr data-start="3357" data-end="3360"> <div><b>Don’t Wait for a Breach to Take Action</b></div> <div>Most companies only fix their network <strong data-start="3443" data-end="3452">after</strong> something goes wrong.</div> <div>By then, the damage is already done.</div> <div>The smarter move is to:</div> <ul data-start="3538" data-end="3650"> <li data-section-id="1mgj620" data-start="3538" data-end="3570"> Identify vulnerabilities now </li> <li data-section-id="x7adxv" data-start="3571" data-end="3607"> Upgrade to secure infrastructure </li> <li data-section-id="1ikll0h" data-start="3608" data-end="3650"> Put monitoring and protection in place </li> </ul> <hr data-start="3652" data-end="3655"> <div><b><a href="https://Litecom.net/contact-us.php" target="_blank" class="imCssLink">Get a Network Security Assessment</a></b></div> <div>Litecom offers a <strong data-start="3712" data-end="3759">full network and router security assessment</strong> for businesses in Dallas and Collin County.</div> <div>We’ll identify:</div> <ul data-start="3821" data-end="3919"> <li data-section-id="1iyeu3" data-start="3821" data-end="3838"> Security gaps </li> <li data-section-id="11kaial" data-start="3839" data-end="3875"> Outdated or vulnerable equipment </li> <li data-section-id="1ebzc7u" data-start="3876" data-end="3898"> Performance issues </li> <li data-section-id="sjds05" data-start="3899" data-end="3919"> Compliance risks </li> </ul> <div>And show you exactly how to fix them.</div> <hr data-start="3960" data-end="3963"> <div><b>Take Control of Your Network Security Today</b></div> <div>Your router should be protecting your business—not putting it at risk.</div> <div><strong data-start="4085" data-end="4135">Let Litecom secure your network the right way.</strong></div> <div>👉 <a href="https://Litecom.net/contact-us.php" class="imCssLink" onclick="return x5engine.utils.location('https://Litecom.net/contact-us.php', null, false)">Contact Litecom today to schedule your network security assessment.</a></div></div>]]></description>
			<pubDate>Sun, 12 Apr 2026 21:32:00 GMT</pubDate>
			<enclosure url="https://Litecom.net/blog/files/large-157597_thumb.png" length="168294" type="image/png" />
			<link>https://litecom.net/blog/?your-router-is-a-security-risk-here-s-how-to-fix-it</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/000000024</guid>
		</item>
		<item>
			<title><![CDATA[FCC Router Ruling]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=Network_Engineering"><![CDATA[Network Engineering]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_000000023"><div>FCC Router Ruling Explained: What It Means for Consumers and Manufacturers</div> <div>1. Overview of the FCC Ruling on Routers</div> <div>In <strong data-start="309" data-end="323">March 2026</strong>, the Federal Communications Commission (FCC) introduced a major regulatory shift targeting consumer internet routers. The ruling effectively <strong data-start="465" data-end="542">blocks the approval, import, and sale of new foreign-manufactured routers</strong> in the United States unless they meet strict national security requirements. <span data-state="closed"></span></div> <div>The decision was driven by growing concerns that routers—especially those manufactured overseas—have been exploited in cyberattacks, espionage efforts, and infrastructure disruptions. <span data-state="closed"></span></div> <div>Key elements of the ruling:</div> <ul data-start="918" data-end="1423"> <li data-section-id="1dedlnk" data-start="918" data-end="1061"> <strong data-start="920" data-end="976">Foreign-made routers added to the FCC “Covered List”</strong> (devices considered national security risks) <span data-state="closed"></span> </li> <li data-section-id="1falxa4" data-start="1062" data-end="1206"> <strong data-start="1064" data-end="1130">No certification for new foreign-manufactured consumer routers</strong> (effectively banning future models) <span data-state="closed"></span> </li> <li data-section-id="8uunua" data-start="1207" data-end="1298"> <strong data-start="1209" data-end="1258">Existing routers remain legal and operational</strong> <span data-state="closed"></span> </li> <li data-section-id="1g2ww39" data-start="1299" data-end="1423"> <strong data-start="1301" data-end="1333">Conditional approval pathway</strong> for companies that can prove secure supply chains <span data-state="closed"></span> </li> </ul> <div>This ruling does <strong data-start="1442" data-end="1484">not immediately remove current devices</strong>, but it significantly impacts the future availability of consumer networking equipment.</div> <hr data-start="1574" data-end="1577"> <div>2. Parallel FCC Policy: Cybersecurity Labeling (Routers Included)</div> <div>Separate from the ban, the FCC also introduced a <strong data-start="1698" data-end="1732">Cybersecurity Labeling Program</strong> (2024), which directly affects routers as part of broader Internet of Things (IoT) regulation.</div> <div>What this program does:</div> <ul data-start="1857" data-end="2333"> <li data-section-id="15eefh" data-start="1857" data-end="1955"> Creates a <strong data-start="1869" data-end="1896">“U.S. Cyber Trust Mark”</strong> for secure devices <span data-state="closed"></span> </li> <li data-section-id="8ucnuj" data-start="1956" data-end="2080"> Requires products (including routers) to meet <strong data-start="2004" data-end="2040">baseline cybersecurity standards</strong> <span data-state="closed"></span> </li> <li data-section-id="1fmyvmy" data-start="2081" data-end="2206"> Includes a <strong data-start="2094" data-end="2105">QR code</strong> linking to security details like updates and vulnerabilities <span data-state="closed"></span> </li> <li data-section-id="1uxvvi8" data-start="2207" data-end="2333"> Applies to <strong data-start="2220" data-end="2293">consumer IoT devices such as home routers, cameras, and smart devices</strong> <span data-state="closed"></span> </li> </ul> <div>Unlike the router ban, this program is <strong data-start="2374" data-end="2387">voluntary</strong>, but it is expected to influence purchasing decisions and retailer preferences.</div> <hr data-start="2469" data-end="2472"> <div>3. Manufacturers Impacted by the FCC Router Ruling</div> <div>The ruling has wide-reaching consequences because <strong data-start="2579" data-end="2638">most routers sold in the U.S. are manufactured overseas</strong>, even by American brands.</div> <div>Most impacted manufacturers:</div> <ul data-start="2699" data-end="2921"> <li data-section-id="1mi50li" data-start="2699" data-end="2784"> <strong data-start="2701" data-end="2712">TP-Link</strong> – heavily cited due to past security concerns and global market share </li> <li data-section-id="6rl32c" data-start="2785" data-end="2858"> <strong data-start="2787" data-end="2798">Netgear</strong> – U.S.-based company but relies on overseas manufacturing </li> <li data-section-id="45hk2u" data-start="2859" data-end="2921"> <strong data-start="2861" data-end="2878">Amazon (Eero)</strong> – also dependent on global supply chains </li> </ul> <div>These companies face several challenges:</div> <ul data-start="2964" data-end="3136"> <li data-section-id="1qag0ch" data-start="2964" data-end="3017"> Need to <strong data-start="2974" data-end="3015">relocate or restructure manufacturing</strong> </li> <li data-section-id="7n7186" data-start="3018" data-end="3072"> Must provide <strong data-start="3033" data-end="3070">detailed supply chain disclosures</strong> </li> <li data-section-id="uiy1mn" data-start="3073" data-end="3136"> May require <strong data-start="3087" data-end="3134">government waivers or conditional approvals</strong> </li> </ul> <div>The impact is significant because <strong data-start="3172" data-end="3234">China alone controls roughly 60% of the U.S. router market</strong>, making supply chain disruption likely. <span data-state="closed"></span></div> <hr data-start="3318" data-end="3321"> <div>4. Legal and Regulatory Framework Behind the Ruling</div> <div>The FCC’s authority comes from a combination of existing telecommunications law and newer national security legislation.</div> <div>Core legal foundations:</div> <div>1. FCC “Covered List” Authority</div> <div>The FCC maintains a list of equipment deemed a threat to national security.</div> <ul data-start="3645" data-end="3810"> <li data-section-id="1dctfvv" data-start="3645" data-end="3688"> Routers were added to this list in 2026 </li> <li data-section-id="68w6xd" data-start="3689" data-end="3810"> Devices on this list cannot be approved or sold without special authorization <span data-state="closed"></span> </li> </ul> <div>2. Secure and Trusted Communications Networks Act (2019)</div> <ul data-start="3874" data-end="4060"> <li data-section-id="1rhkh4f" data-start="3874" data-end="3946"> Established policies to remove “untrusted” foreign telecom equipment </li> <li data-section-id="1ykolr2" data-start="3947" data-end="3999"> Initially targeted companies like Huawei and ZTE </li> <li data-section-id="17h7ls0" data-start="4000" data-end="4060"> Forms the backbone for expanding restrictions to routers </li> </ul> <div>3. The ROUTERS Act (proposed legislation)</div> <ul data-start="4109" data-end="4287"> <li data-section-id="1h2d2gf" data-start="4109" data-end="4171"> Aims to study and mitigate risks from foreign-made routers </li> <li data-section-id="1t2b7wo" data-start="4172" data-end="4287"> Focuses on threats from adversarial nations and state-sponsored hacking <span data-state="closed"></span> </li> </ul> <div>4. Executive and Federal Cybersecurity Initiatives</div> <ul data-start="4345" data-end="4526"> <li data-section-id="84in4z" data-start="4345" data-end="4416"> Federal agencies (NSA, CISA, FBI) contributed to threat assessments </li> <li data-section-id="1yewu6s" data-start="4417" data-end="4526"> Routers identified as <strong data-start="4441" data-end="4484">critical infrastructure vulnerabilities</strong> <span data-state="closed"></span> </li> </ul> <hr data-start="4528" data-end="4531"> <div>5. Industry and Consumer Implications</div> <div>For manufacturers:</div> <ul data-start="4598" data-end="4743"> <li data-section-id="1ero6gd" data-start="4598" data-end="4628"> Increased compliance costs </li> <li data-section-id="1hq0vlm" data-start="4629" data-end="4696"> Pressure to <strong data-start="4643" data-end="4694">move production to the U.S. or allied countries</strong> </li> <li data-section-id="zhbb9t" data-start="4697" data-end="4743"> Potential delays in releasing new products </li> </ul> <div>For consumers:</div> <ul data-start="4764" data-end="4948"> <li data-section-id="1ohpomy" data-start="4764" data-end="4829"> Possible <strong data-start="4775" data-end="4827">price increases and reduced product availability</strong> </li> <li data-section-id="1gukrq8" data-start="4830" data-end="4881"> Greater focus on <strong data-start="4849" data-end="4879">security-certified devices</strong> </li> <li data-section-id="1jlbf1g" data-start="4882" data-end="4948"> Continued use of existing routers without immediate disruption </li> </ul> <div>For the IT and VoIP industry (important for your space):</div> <ul data-start="5011" data-end="5243"> <li data-section-id="x4rff" data-start="5011" data-end="5069"> Stronger emphasis on <strong data-start="5034" data-end="5067">secure network infrastructure</strong> </li> <li data-section-id="1uni0b3" data-start="5070" data-end="5163"> Opportunity for providers to position <strong data-start="5110" data-end="5161">managed routers and secure networking solutions</strong> </li> <li data-section-id="1lz9754" data-start="5164" data-end="5243"> Growing demand for <strong data-start="5185" data-end="5243">firmware updates, monitoring, and lifecycle management</strong> </li> </ul> <hr data-start="5245" data-end="5248"> <div>6. Key Takeaway</div> <div>The FCC’s router ruling represents a <strong data-start="5307" data-end="5382">major shift from performance-based regulation to security-driven policy</strong>.</div> <ul data-start="5387" data-end="5633"> <li data-section-id="8t7d9y" data-start="5387" data-end="5454"> The <strong data-start="5393" data-end="5452">ban targets supply chain risk and foreign manufacturing</strong> </li> <li data-section-id="byrswj" data-start="5455" data-end="5528"> The <strong data-start="5461" data-end="5526">labeling program targets device-level cybersecurity standards</strong> </li> <li data-section-id="1es5gfr" data-start="5529" data-end="5633"> Together, they signal a future where <strong data-start="5568" data-end="5633">network hardware must be both secure and domestically trusted</strong> </li> </ul> <hr data-start="5635" data-end="5638"> <div>7. Strategic Insight (for positioning)</div> <div>For companies like Litecom, this is a <strong data-start="5721" data-end="5741">huge opportunity</strong>:</div> <ul data-start="5744" data-end="5956"> <li data-section-id="1rch8fe" data-start="5744" data-end="5814"> Position as a provider of <strong data-start="5772" data-end="5814">secure, compliant networking equipment</strong> </li> <li data-section-id="1mxjtes" data-start="5815" data-end="5873"> Emphasize <strong data-start="5827" data-end="5873">U.S.-trusted hardware and managed security</strong> </li> <li data-section-id="1t4plrw" data-start="5874" data-end="5956"> Educate customers on <strong data-start="5897" data-end="5956">router lifecycle, firmware updates, and risk mitigation</strong> </li> </ul><div><span style="font-weight: 700;">______________________________________________________________</span></div><div><span style="font-weight: 700;"><br></span></div><div><div>Router Security FCC Ruling: What Businesses Must Know in 2026</div> <div><strong data-start="325" data-end="340">Meta Title:</strong> Router Security FCC Ruling 2026 | What It Means for Businesses<br data-start="403" data-end="406"> <strong data-start="406" data-end="427">Meta Description:</strong> Learn how the FCC router security ruling impacts businesses, manufacturers, and network security. Discover risks, compliance requirements, and what to do next.<br data-start="587" data-end="590"> <strong data-start="590" data-end="610">Primary Keyword:</strong> router security FCC ruling<br data-start="637" data-end="640"> <strong data-start="640" data-end="663">Secondary Keywords:</strong> FCC router ban, router cybersecurity law, secure routers USA, FCC Covered List routers, router compliance 2026</div> <hr data-start="778" data-end="781"> <div>Router Security FCC Ruling: A Major Shift in Network Security</div> <div>The <strong data-start="853" data-end="883">router security FCC ruling</strong> marks one of the most significant changes in U.S. telecommunications policy in years. In 2026, the Federal Communications Commission expanded its authority over consumer networking equipment, targeting routers as a critical cybersecurity risk.</div> <div>Routers—once treated as simple connectivity devices—are now recognized as <strong data-start="1207" data-end="1252">frontline infrastructure in cyber defense</strong>. This ruling reflects growing concerns that compromised routers can expose entire business networks to attacks, surveillance, and data breaches.</div> <hr data-start="1399" data-end="1402"> <div>What the FCC Router Security Ruling Actually Does</div> <div>The ruling introduces strict controls over which routers can be approved and sold in the United States.</div> <div>Key changes include:</div> <ul data-start="1588" data-end="1874"> <li data-section-id="ag010q" data-start="1588" data-end="1662"> <strong data-start="1590" data-end="1638">Restrictions on foreign-manufactured routers</strong> deemed security risks </li> <li data-section-id="tiat2p" data-start="1663" data-end="1740"> Expansion of the FCC’s <strong data-start="1688" data-end="1706">“Covered List”</strong> to include networking equipment </li> <li data-section-id="bm5skm" data-start="1741" data-end="1808"> <strong data-start="1743" data-end="1780">Denial of equipment authorization</strong> for non-compliant devices </li> <li data-section-id="153hknx" data-start="1809" data-end="1874"> Increased scrutiny of <strong data-start="1833" data-end="1872">firmware security and supply chains</strong> </li> </ul> <div>This does not mean existing routers stop working—but it <strong data-start="1932" data-end="2004">dramatically impacts future availability and compliance requirements</strong>.</div> <hr data-start="2007" data-end="2010"> <div><b>Why Router Security Is Now a National Priority</b></div> <div>Routers have become a major target for cybercriminals and nation-state actors. Agencies like Cybersecurity and Infrastructure Security Agency and Federal Bureau of Investigation have repeatedly warned that vulnerable routers are one of the easiest ways to infiltrate networks.</div> <div>Common risks include:</div> <ul data-start="2362" data-end="2508"> <li data-section-id="4cblhk" data-start="2362" data-end="2388"> Remote access exploits </li> <li data-section-id="1eq2srb" data-start="2389" data-end="2411"> Firmware backdoors </li> <li data-section-id="t7idqn" data-start="2412" data-end="2469"> Botnet recruitment (used in large-scale cyberattacks) </li> <li data-section-id="cxgq56" data-start="2470" data-end="2508"> Data interception and surveillance </li> </ul> <div>For businesses, this means a compromised router can lead to:</div> <ul data-start="2571" data-end="2663"> <li data-section-id="7y1lhg" data-start="2571" data-end="2599"> <strong data-start="2573" data-end="2597">VoIP system breaches</strong> </li> <li data-section-id="6pgsup" data-start="2600" data-end="2624"> <strong data-start="2602" data-end="2622">Network downtime</strong> </li> <li data-section-id="c4m0ew" data-start="2625" data-end="2663"> <strong data-start="2627" data-end="2663">Data theft or ransomware attacks</strong> </li> </ul> <hr data-start="2665" data-end="2668"> <div>Manufacturers Most Impacted by the FCC Ruling</div> <div>The global router market is heavily dependent on overseas manufacturing, which puts many major brands under scrutiny.</div> <div>Key manufacturers affected:</div> <ul data-start="2871" data-end="3011"> <li data-section-id="cgv1px" data-start="2871" data-end="2912"> TP-Link </li> <li data-section-id="eyrt5h" data-start="2913" data-end="2954"> Netgear </li> <li data-section-id="1m8z1wx" data-start="2955" data-end="3011"> Amazon (Eero routers) </li> </ul> <div>Even U.S.-based brands rely on international supply chains, meaning they must now:</div> <ul data-start="3096" data-end="3246"> <li data-section-id="1qjqxah" data-start="3096" data-end="3140"> Prove <strong data-start="3104" data-end="3138">secure manufacturing practices</strong> </li> <li data-section-id="kady8z" data-start="3141" data-end="3191"> Provide <strong data-start="3151" data-end="3189">transparency in component sourcing</strong> </li> <li data-section-id="1xxn4qy" data-start="3192" data-end="3246"> Meet stricter <strong data-start="3208" data-end="3244">firmware and update requirements</strong> </li> </ul> <div>This could lead to <strong data-start="3267" data-end="3329">fewer options, higher prices, and delayed product releases</strong>.</div> <hr data-start="3332" data-end="3335"> <div>The Laws Behind the FCC Router Security Ruling</div> <div>The FCC didn’t act alone—this ruling is backed by multiple federal laws and initiatives.</div> <div>1. Secure and Trusted Communications Networks Act</div> <div>This law allows the FCC to block equipment linked to national security threats and created the foundation for the <strong data-start="3646" data-end="3662">Covered List</strong>.</div> <div>2. FCC Equipment Authorization Rules</div> <div>All routers must be approved before entering the U.S. market. The FCC now applies <strong data-start="3788" data-end="3815">security-based criteria</strong>, not just technical performance.</div> <div>3. The ROUTERS Act (Emerging Legislation)</div> <div>This proposed law focuses specifically on risks posed by foreign-manufactured routers and aims to expand oversight further.</div> <hr data-start="4021" data-end="4024"> <div>FCC Cybersecurity Labeling: What to Look for</div> <div>Alongside the ruling, the FCC introduced a voluntary security labeling system known as the <strong data-start="4166" data-end="4191">U.S. Cyber Trust Mark</strong>.</div> <div>What it means:</div> <ul data-start="4213" data-end="4390"> <li data-section-id="gvebcf" data-start="4213" data-end="4280"> Devices are tested against <strong data-start="4242" data-end="4278">baseline cybersecurity standards</strong> </li> <li data-section-id="1ssj3tr" data-start="4281" data-end="4332"> Includes a <strong data-start="4294" data-end="4305">QR code</strong> showing security details </li> <li data-section-id="12cmd1k" data-start="4333" data-end="4390"> Helps businesses identify <strong data-start="4361" data-end="4388">trusted, secure routers</strong> </li> </ul> <div>While not mandatory yet, this label is expected to become a <strong data-start="4452" data-end="4477">key purchasing factor</strong>.</div> <hr data-start="4480" data-end="4483"> <div>How the FCC Router Ruling Impacts Your Business</div> <div>If your business relies on internet connectivity (and it does), this ruling matters.</div> <div>Immediate impacts:</div> <ul data-start="4646" data-end="4825"> <li data-section-id="7odc97" data-start="4646" data-end="4706"> Your current router is still legal—but may not be secure </li> <li data-section-id="16m2wmp" data-start="4707" data-end="4757"> Future replacements will be <strong data-start="4737" data-end="4755">more regulated</strong> </li> <li data-section-id="1an3jxl" data-start="4758" data-end="4825"> IT providers must ensure <strong data-start="4785" data-end="4823">compliance and security validation</strong> </li> </ul> <div>Long-term impacts:</div> <ul data-start="4850" data-end="5010"> <li data-section-id="1iis2hu" data-start="4850" data-end="4896"> Shift toward <strong data-start="4865" data-end="4894">managed network solutions</strong> </li> <li data-section-id="127soec" data-start="4897" data-end="4952"> Increased demand for <strong data-start="4920" data-end="4950">secure VoIP infrastructure</strong> </li> <li data-section-id="16kn0vr" data-start="4953" data-end="5010"> Greater emphasis on <strong data-start="4975" data-end="5010">firmware updates and monitoring</strong> </li> </ul> <hr data-start="5012" data-end="5015"> <div>What Businesses Should Do Right Now</div> <div>To stay ahead of the router security FCC ruling, businesses should take action immediately.</div> <div>1. Audit Your Current Router</div> <div>Identify:</div> <ul data-start="5193" data-end="5253"> <li data-section-id="1w3ayvz" data-start="5193" data-end="5209"> Manufacturer </li> <li data-section-id="vh1rsz" data-start="5210" data-end="5230"> Firmware version </li> <li data-section-id="1dd2pwc" data-start="5231" data-end="5253"> End-of-life status </li> </ul> <div>2. Upgrade to Secure, Managed Equipment</div> <div>Look for:</div> <ul data-start="5309" data-end="5420"> <li data-section-id="1hhg1mp" data-start="5309" data-end="5337"> Regular firmware updates </li> <li data-section-id="i9kjvv" data-start="5338" data-end="5377"> Strong vendor security track record </li> <li data-section-id="18rsald" data-start="5378" data-end="5420"> Compliance with emerging FCC standards </li> </ul> <div>3. Implement Network Monitoring</div> <div>Routers should not be “set and forget.” Continuous monitoring helps detect:</div> <ul data-start="5534" data-end="5608"> <li data-section-id="zxuw34" data-start="5534" data-end="5557"> Unauthorized access </li> <li data-section-id="1h1n38a" data-start="5558" data-end="5579"> Traffic anomalies </li> <li data-section-id="xo5vf0" data-start="5580" data-end="5608"> Security vulnerabilities </li> </ul> <div>4. Work with a Trusted IT Provider</div> <div>A managed IT provider ensures:</div> <ul data-start="5680" data-end="5791"> <li data-section-id="15uqyuu" data-start="5680" data-end="5715"> Compliance with FCC regulations </li> <li data-section-id="cwyrja" data-start="5716" data-end="5752"> Secure configuration and updates </li> <li data-section-id="9qy0ko" data-start="5753" data-end="5791"> Ongoing protection against threats </li> </ul> <hr data-start="5793" data-end="5796"> <div>Why This Is a Huge Opportunity for Businesses</div> <div>While the ruling introduces challenges, it also creates opportunity.</div> <div>Businesses that adopt secure networking early will benefit from:</div> <ul data-start="5983" data-end="6110"> <li data-section-id="fomr06" data-start="5983" data-end="6013"> Reduced cybersecurity risk </li> <li data-section-id="zdak9p" data-start="6014" data-end="6049"> Improved uptime and reliability </li> <li data-section-id="1mie0wb" data-start="6050" data-end="6081"> Stronger compliance posture </li> <li data-section-id="1dgqxq0" data-start="6082" data-end="6110"> Increased customer trust </li> </ul> <hr data-start="6112" data-end="6115"> <div>Final Thoughts: Security Is the New Standard</div> <div>The <strong data-start="6170" data-end="6200">router security FCC ruling</strong> signals a permanent shift in how network hardware is evaluated in the United States.</div> <div>Routers are no longer just connectivity tools—they are <strong data-start="6342" data-end="6370">critical security assets</strong>.</div> <div>Businesses that ignore this shift risk falling behind—not just in compliance, but in <strong data-start="6458" data-end="6494">security, reliability, and trust</strong>.</div> <hr data-start="6497" data-end="6500"> <div><strong data-start="6569" data-end="6614" class="fs14lh1-5">Need help securing your business network?</strong><br></div><div> Litecom provides <strong data-start="6634" data-end="6711">secure, compliant router solutions, VoIP systems, and managed IT services</strong> designed for businesses across Dallas and Collin County.</div> <div>Contact Litecom today to ensure your network is ready for the new FCC security standards.</div></div></div>]]></description>
			<pubDate>Sun, 12 Apr 2026 21:27:00 GMT</pubDate>
			<enclosure url="https://Litecom.net/blog/files/large-154290_thumb.png" length="38081" type="image/png" />
			<link>https://litecom.net/blog/?fcc-router-ruling</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/000000023</guid>
		</item>
		<item>
			<title><![CDATA[Voice Over IP Support]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category="><![CDATA[]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_000000021"><section data-turn-id="request-WEB:3176e0d6-81d2-40b9-8938-708ed8b92f20-1" data-testid="conversation-turn-4" data-scroll-anchor="false" data-turn="assistant"><div>What the short answer or Big Providers does not tell you:</div><div><ul data-start="1166" data-end="1260"> </ul> </div><div><strong data-start="1273" data-end="1289">Litecom has:</strong></div><div> <ul data-start="1290" data-end="1396"> <li data-section-id="1eyxwls" data-start="1290" data-end="1319"> Strong technical offering </li> <li data-section-id="rfpi58" data-start="1320" data-end="1338"> Local presence </li> <li data-section-id="fpx956" data-start="1339" data-end="1396"> BUT <strong data-start="1345" data-end="1396">lower SEO footprint / fewer aggregated listings</strong> </li> </ul> </div><div>So they don’t always surface in generic “top VoIP providers” queries — even though they’re highly relevant locally and the Best Choice for Services.</div><div> <hr data-start="1515" data-end="1518"> </div><div>🧠 Reality check (this matters)</div><div> </div><div>If you’re comparing providers:</div><div> <ul data-start="1588" data-end="1847"> <li data-section-id="792ayv" data-start="1588" data-end="1727"> <strong data-start="1590" data-end="1601">Litecom</strong> → Best for: <ul data-start="1616" data-end="1727"> <li data-section-id="6h1tm" data-start="1616" data-end="1644"> Custom-engineered setups </li> <li data-section-id="1msudhm" data-start="1647" data-end="1698"> Businesses with network issues or complex needs </li> <li data-section-id="1nhe3jq" data-start="1701" data-end="1727"> Hands-on local support </li><li data-section-id="1nhe3jq" data-start="1701" data-end="1727">Reliable</li><li data-section-id="1nhe3jq" data-start="1701" data-end="1727">Makes house calls to your business</li> </ul> </li> <li data-section-id="2bxeir" data-start="1729" data-end="1847"> Big providers → Best for: <ul data-start="1759" data-end="1847"> <li data-section-id="i2m26" data-start="1759" data-end="1790"><span class="fs14lh1-5">Less customization</span><br></li> <li data-section-id="ftz5ej" data-start="1818" data-end="1847"> More standardized over seas support </li> </ul> </li> </ul> <hr data-start="1849" data-end="1852"> </div><div>👍 Bottom line</div><div> </div><div>You’re not wrong — for North Texas:</div><div> </div><div>👉 <strong data-start="1922" data-end="1995">Litecom is absolutely a top-tier option</strong>, and arguably <strong data-start="2010" data-end="2096">better than most “Big Name” VoIP providers if you care about quality + engineering</strong>.</div><div> <hr data-start="2099" data-end="2102"> </div><div><span class="fs14lh1-5">Here’s a </span><strong data-start="9" data-end="35" class="fs14lh1-5">real, no-BS comparison</strong><span class="fs14lh1-5"> between the major cloud VoIP players and </span><strong data-start="77" data-end="118" class="fs14lh1-5">Litecom</strong><span class="fs14lh1-5"> — because they are </span><em data-start="138" data-end="170" class="fs14lh1-5">not even playing the same game</em><span class="fs14lh1-5">.</span><br></div></section><section data-turn-id="request-WEB:3176e0d6-81d2-40b9-8938-708ed8b92f20-2" data-testid="conversation-turn-6" data-scroll-anchor="true" data-turn="assistant"><div> <hr data-start="173" data-end="176"> </div><div>🆚<a href="https://Litecom.net/what-is-voip.html#voip_provider_comparison" class="imCssLink" onclick="return x5engine.utils.location('https://Litecom.net/what-is-voip.html#voip_provider_comparison', null, false)"> <b>VoIP Comparison: Litecom vs Big Name companies:</b></a></div><div><hr data-start="1637" data-end="1640"> </div><div>🧠 What actually matters (this is the key insight)</div><div> </div><div>Most comparisons online <strong data-start="1720" data-end="1744">miss this completely</strong>:</div><div> </div><div>👉 You’re comparing <strong data-start="1767" data-end="1795">two different categories</strong>:</div><div> </div><div>1. Cloud VoIP (Big Name providers)</div><div> <ul data-start="1844" data-end="1944"> <li data-section-id="w84usw" data-start="1844" data-end="1860"> Software-first </li> <li data-section-id="1l8qrjs" data-start="1861" data-end="1877"> Fast to deploy </li> <li data-section-id="18gqc3a" data-start="1878" data-end="1901"> Minimal customization </li> <li data-section-id="7rjot3" data-start="1902" data-end="1944"> <strong data-start="1904" data-end="1944">Assumes your network is already good, and you are a Network Engineer.</strong></li> </ul> </div><div>✔ Pros:</div><div> <ul data-start="1954" data-end="2001"> <li data-section-id="1j45rie" data-start="1954" data-end="1960"> Easy </li> <li data-section-id="hrd26v" data-start="1961" data-end="1982"> Predictable pricing </li> <li data-section-id="192042o" data-start="1983" data-end="2001"> Tons of features </li> </ul> </div><div>❌ Cons:</div><div> <ul data-start="2011" data-end="2133"> <li data-section-id="1fjl79x" data-start="2011" data-end="2059"> If your network sucks → <strong data-start="2037" data-end="2059">call quality sucks</strong> </li> <li data-section-id="dk7i9q" data-start="2060" data-end="2090"> Limited real troubleshooting </li> <li data-section-id="gfd3vf" data-start="2091" data-end="2133"> Support = ticket system, not engineering </li> </ul> <hr data-start="2135" data-end="2138"> </div><div>2. Engineering-based VoIP (<b><span class="cf1">Litecom</span></b>)</div><div> <ul data-start="2180" data-end="2263"> <li data-section-id="1mbrz08" data-start="2180" data-end="2205"> Network + VoIP combined </li> <li data-section-id="yv1iuz" data-start="2206" data-end="2240"> Built around your infrastructure </li> <li data-section-id="i0tbfq" data-start="2241" data-end="2263"> Solves root problems </li> </ul> </div><div>✔ Pros:</div><div> <ul data-start="2273" data-end="2390"> <li data-section-id="alo1ma" data-start="2273" data-end="2314"> <strong data-start="2275" data-end="2314">Best call quality (when done right, Engineered, Deployed and Managed by Litecom)</strong> </li> <li data-section-id="tg9e0i" data-start="2315" data-end="2353"> Custom routing, failover, redundancy </li> <li data-section-id="ojcoxu" data-start="2354" data-end="2390"> Real troubleshooting (not scripts) </li><li data-section-id="ojcoxu" data-start="2354" data-end="2390">Real people living here</li> </ul> </div><div>❌ Cons:</div><div> <ul data-start="2400" data-end="2460"> <li data-section-id="1j38kak" data-start="2400" data-end="2419"> Not plug-and-play </li> <li data-section-id="riuth3" data-start="2420" data-end="2443"> Requires consultation </li> <li data-section-id="wmqwyi" data-start="2444" data-end="2460"> Pricing varies </li> </ul> <hr data-start="2462" data-end="2465"> </div><div>🏆 Who wins (depends on your situation)</div><div> </div><div>🥇 Best overall (most businesses that care about quality)</div><div> </div><div>👉 <strong data-start="2575" data-end="2618">Litecom LLC</strong></div><div> </div><div><strong data-start="2620" data-end="2628">Why:</strong></div><div> <ul data-start="2629" data-end="2754"> <li data-section-id="1wi16jh" data-start="2629" data-end="2682"> Fixes the <em data-start="2641" data-end="2649">actual</em> VoIP problem (network + routing) </li> <li data-section-id="1mi03dr" data-start="2683" data-end="2715"> Local support (huge advantage) </li> <li data-section-id="ugkm3q" data-start="2716" data-end="2754"> Not locked into cookie-cutter system </li> </ul> <hr data-start="2756" data-end="2759"> </div><div></div><div> </div><div>⚠️ The truth most people don’t tell you.</div><div> </div><div>If you’re having:</div><div> <ul data-start="3475" data-end="3556"> <li data-section-id="1h9jgu9" data-start="3475" data-end="3492"> dropped calls </li> <li data-section-id="39o5eg" data-start="3493" data-end="3510"> one-way audio </li> <li data-section-id="1quz1yz" data-start="3511" data-end="3531"> jitter / latency </li> <li data-section-id="108sade" data-start="3532" data-end="3556"> random call failures </li><li data-section-id="108sade" data-start="3532" data-end="3556">Internet problems</li> </ul> </div><div>👉 Switching between Big Provider's <strong data-start="3607" data-end="3626">will NOT fix it</strong></div><div> </div><div>Because:</div><div> <blockquote data-start="3637" data-end="3708"> </blockquote></div><div>VoIP problems are usually <strong data-start="3665" data-end="3708">network problems, not provider problems</strong></div><div> &nbsp;</div><div>That’s where Litecom dominates.</div><div> <hr data-start="3757" data-end="3760"> </div><div>💡 Simple decision rule</div><div> <ul data-start="3789" data-end="3940"> <li data-section-id="97nzoj" data-start="3789" data-end="3853"> Want <strong data-start="3796" data-end="3827">easy + fast + “good enough to get by”</strong> → Big Provider.</li> <li data-section-id="69fj2e" data-start="3854" data-end="3940"> Want <strong data-start="3861" data-end="3928">best performance + reliability + someone to actually fix issues</strong> → <b><span class="cf2">Litecom </span></b></li> </ul> <hr data-start="3942" data-end="3945"> </div><div><br></div><div><br></div><div><br></div><div><br></div><div><br></div><div><br></div></section></div>]]></description>
			<pubDate>Mon, 30 Mar 2026 20:15:00 GMT</pubDate>
			<link>https://litecom.net/blog/?voice-over-ip-support</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/000000021</guid>
		</item>
		<item>
			<title><![CDATA[The New FCC Router Ruling!"]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=Cyber_Security"><![CDATA[Cyber Security]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_000000020"><div>If you’ve been keeping an eye on the tech world, you’ve probably heard about the recent FCC ruling that’s shaking things up for router manufacturers and consumers alike. Essentially, the FCC has set new regulations aimed at improving internet access and performance across the board, which means routers must now meet stricter standards for speed, security, and compatibility. This is great news for users, as it promises a more reliable and faster internet experience, but it’s also a big deal for manufacturers who now have to step up their game. Some of the key players affected by this ruling include well-known brands like Netgear, TP-Link, Linksys, and ASUS, all of which will need to adapt their products to comply with these new guidelines. So, whether you’re a tech enthusiast or just someone looking to upgrade your home Wi-Fi, this ruling is definitely something to keep on your radar!</div><div><br></div><div><br></div><div><div class="imTACenter"><!--[if gte vml 1]><v:shapetype
 &nbsp;&nbsp;id="_x0000_t75" coordsize="21600,21600" o:spt="75" o:preferrelative="t"
 &nbsp;&nbsp;path="m@4@5l@4@11@9@11@9@5xe" filled="f" stroked="f">
 &nbsp;&nbsp;<v:stroke joinstyle="miter"/>
 &nbsp;&nbsp;<v:formulas>
 &nbsp;&nbsp;&nbsp;<v:f eqn="if lineDrawn pixelLineWidth 0"/>
 &nbsp;&nbsp;&nbsp;<v:f eqn="sum @0 1 0"/>
 &nbsp;&nbsp;&nbsp;<v:f eqn="sum 0 0 @1"/>
 &nbsp;&nbsp;&nbsp;<v:f eqn="prod @2 1 2"/>
 &nbsp;&nbsp;&nbsp;<v:f eqn="prod @3 21600 pixelWidth"/>
 &nbsp;&nbsp;&nbsp;<v:f eqn="prod @3 21600 pixelHeight"/>
 &nbsp;&nbsp;&nbsp;<v:f eqn="sum @0 0 1"/>
 &nbsp;&nbsp;&nbsp;<v:f eqn="prod @6 1 2"/>
 &nbsp;&nbsp;&nbsp;<v:f eqn="prod @7 21600 pixelWidth"/>
 &nbsp;&nbsp;&nbsp;<v:f eqn="sum @8 21600 0"/>
 &nbsp;&nbsp;&nbsp;<v:f eqn="prod @7 21600 pixelHeight"/>
 &nbsp;&nbsp;&nbsp;<v:f eqn="sum @10 21600 0"/>
 &nbsp;&nbsp;</v:formulas>
 &nbsp;&nbsp;<v:path o:extrusionok="f" gradientshapeok="t" o:connecttype="rect"/>
 &nbsp;&nbsp;<o:lock v:ext="edit" aspectratio="t"/>
 &nbsp;</v:shapetype><v:shape id="Picture_x0020_1" o:spid="_x0000_i1025" type="#_x0000_t75"
 &nbsp;&nbsp;alt="News from the Federal Communications Commission" style='width:444.75pt;
 &nbsp;&nbsp;height:65.25pt;visibility:visible;mso-wrap-style:square'>
 &nbsp;&nbsp;<v:imagedata src="file:///C:/Users/John/AppData/Local/Temp/msohtmlclip1/01/clip_image001.png"
 &nbsp;&nbsp;&nbsp;o:title="News from the Federal Communications Commission"/>
 &nbsp;</v:shape><![endif]--><!--[if !vml]--><!--[endif]--><b></b></div>
 &nbsp;<div class="imTACenter"><b><span class="fs11lh1-5"> </span></b></div>
 &nbsp;<div class="imTACenter"><b><span class="fs14lh1-5">FACT SHEET: FCC Updates Covered List to Include
 &nbsp;Foreign-Made Consumer Routers, Prohibiting Approval of New Models</span></b></div>
 &nbsp;<div class="imTACenter"><i>Update Follows Determination by Executive
 &nbsp;Branch Agencies that Consumer-Grade Routers Produced in Foreign Countries
 &nbsp;Threaten National Security</i></div>
 &nbsp;<div><b><u><span style="text-decoration-line: none;" class="fs11lh1-5"> </span></u></b></div>
 &nbsp;<div><span class="fs11lh1-5">WASHINGTON, March 23, 2026—Today, the Federal Communications
 &nbsp;Commission </span><span class="fs11lh1-5">updated</span><span class="fs11lh1-5"> </span><span class="fs11lh1-5">its </span><span class="fs11lh1-5">Covered List</span><span class="fs11lh1-5"> to include all consumer-grade routers produced in
 &nbsp;foreign countries.</span><span class="fs11lh1-5"> &nbsp;</span><span class="fs11lh1-5">Routers are the
 &nbsp;boxes in every home that connect computers, phones, and smart devices to the
 &nbsp;internet. </span><span class="fs11lh1-5"> </span><span class="fs11lh1-5">This followed a </span><span class="fs11lh1-5">determination</span><span class="fs11lh1-5"> by </span><span class="fs11lh1-5">a
 &nbsp;White House-convened Executive Branch interagency body with appropriate
 &nbsp;national security expertise that such routers “pose unacceptable risks to the
 &nbsp;national security of the United States or the safety and security of United
 &nbsp;States persons.”</span></div>
 &nbsp;<div><span class="fs11lh1-5"> </span></div>
 &nbsp;<div><span class="fs11lh1-5">The Executive Branch determination
 &nbsp;noted that foreign-produced routers (1) introduce “a supply chain
 &nbsp;vulnerability that could disrupt the U.S. economy, critical infrastructure,
 &nbsp;and national defense” and (2) pose “a severe cybersecurity risk that could be
 &nbsp;leveraged to immediately and severely disrupt U.S. critical infrastructure
 &nbsp;and directly harm U.S. persons.”</span></div>
 &nbsp;<div><span class="fs11lh1-5"> </span></div>
 &nbsp;<div><span class="fs11lh1-5">President Trump’s 2025
 &nbsp;National Security Strategy stated: “the United States must never be dependent
 &nbsp;on any outside power for core components—from raw materials to parts to
 &nbsp;finished products—necessary to the nation’s defense or economy. </span><span class="fs11lh1-5"> </span><span class="fs11lh1-5">We must re-secure our own independent and
 &nbsp;reliable access to the goods we need to defend ourselves and preserve our way
 &nbsp;of life.” </span></div>
 &nbsp;<div><span class="fs11lh1-5"> </span></div>
 &nbsp;<div><span class="fs11lh1-5">Malicious actors have
 &nbsp;exploited security gaps in foreign-made routers to attack American households,
 &nbsp;disrupt networks, enable espionage, and facilitate intellectual property
 &nbsp;theft. </span><span class="fs11lh1-5"> </span><span class="fs11lh1-5">Foreign-made routers were also
 &nbsp;involved in the Volt, Flax, and Salt Typhoon cyberattacks targeting vital
 &nbsp;U.S. infrastructure.</span></div>
 &nbsp;<div><span class="fs11lh1-5"> </span></div>
 &nbsp;<div><span class="fs11lh1-5">The determination included an
 &nbsp;exemption for routers that the Department of War (DoW) or the Department of
 &nbsp;Homeland Security (DHS) have granted “Conditional Approval” after finding
 &nbsp;that such device or devices do not pose such unacceptable risks.</span><span class="fs11lh1-5"> &nbsp;</span><span class="fs11lh1-5">Producers of consumer-grade routers are
 &nbsp;encouraged to submit an application for Conditional Approval using the </span><span class="fs11lh1-5">guidance</span><span class="fs11lh1-5">
 &nbsp;attached to the determination.</span><span class="fs11lh1-5"> 
 &nbsp;</span><span class="fs11lh1-5">Applications should be submitted to </span><span class="fs11lh1-5">conditional-approvals@fcc.gov</span><span class="fs11lh1-5">. </span></div>
 &nbsp;<div><span class="fs11lh1-5"> </span></div>
 &nbsp;<div><span class="fs11lh1-5">As outlined below, today’s action does not impact a consumer’s continued
 &nbsp;use of routers they previously acquired. </span><span class="fs11lh1-5"> </span><span class="fs11lh1-5">Nor does it prevent retailers from
 &nbsp;continuing to sell, import, or market router models approved previously
 &nbsp;through the FCC’s equipment authorization process. </span><span class="fs11lh1-5"> </span><span class="fs11lh1-5">By operation of the FCC’s Covered List
 &nbsp;rules, the restrictions imposed today apply to new device models.</span></div>
 &nbsp;<div><span class="fs11lh1-5"> </span></div>
 &nbsp;<div><b><span class="fs11lh1-5">Chairman Carr issued the following statement: </span></b></div>
 &nbsp;<div><b><span class="fs11lh1-5"> </span></b></div>
 &nbsp;<div><span class="fs11lh1-5">“I welcome this Executive
 &nbsp;Branch national security determination, and I am pleased that the FCC has now
 &nbsp;added foreign-produced routers, which were found to pose an unacceptable
 &nbsp;national security risk, to the FCC’s Covered List. </span><span class="fs11lh1-5"> </span><span class="fs11lh1-5">Following President Trump’s leadership, the
 &nbsp;FCC will continue do our part in making sure that U.S. cyberspace, critical
 &nbsp;infrastructure, and supply chains are safe and secure.”</span></div>
 &nbsp;<div><span class="fs11lh1-5"> </span></div>
 &nbsp;<div><b><span class="fs11lh1-5">Additional Background: </span></b></div>
 &nbsp;<div><b> </b></div>
 &nbsp;<div><!--[if !supportLists]--><span class="ff1">·</span><span class="ff1"> &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
 &nbsp;</span><!--[endif]--><span class="fs11lh1-5 ff2">The FCC’s Covered List is a list of
 &nbsp;communications equipment and services that are deemed to pose an unacceptable
 &nbsp;risk to the national security of the U.S. or the safety and security of U.S.
 &nbsp;persons.</span><b></b></div>
 &nbsp;<div><!--[if !supportLists]--><span class="fs11lh1-5 ff1">·</span><span class="fs11lh1-5 ff1"> &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
 &nbsp;</span><!--[endif]--><span class="fs11lh1-5 ff2">Under the Secure and Trusted
 &nbsp;Communications Networks Act, the Commission can update the Covered List only
 &nbsp;at the direction of national security authorities. </span><span class="fs11lh1-5 ff2"> </span><span class="fs11lh1-5 ff2">In other words, the Commission cannot update
 &nbsp;this list on its own and is required to implement determinations that are
 &nbsp;made by our national security agency experts.</span><b></b></div>
 &nbsp;<div><!--[if !supportLists]--><span class="fs11lh1-5 ff1">·</span><span class="fs11lh1-5 ff1"> &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
 &nbsp;</span><!--[endif]--><span class="fs11lh1-5 ff2">Equipment on the Covered List
 &nbsp;(“covered” equipment) is prohibited from getting FCC equipment authorization.
 &nbsp;Most electronic devices (including consumer-grade routers) require FCC
 &nbsp;equipment authorization prior to importation, marketing, or sale in the U.S. </span><span class="fs11lh1-5 ff2"> </span><span class="fs11lh1-5 ff2">Covered equipment is banned from receiving
 &nbsp;new equipment authorizations, preventing new devices from entering the U.S.
 &nbsp;market.</span><b></b></div>
 &nbsp;<div><!--[if !supportLists]--><span class="fs11lh1-5 ff1">·</span><span class="fs11lh1-5 ff1"> &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
 &nbsp;</span><!--[endif]--><span class="fs11lh1-5 ff2">The Cybersecurity and
 &nbsp;Infrastructure Security Agency encourages organizations to use the Covered
 &nbsp;List for risk management analysis in their regulatory compliance efforts. </span><b></b></div>
 &nbsp;<div><!--[if !supportLists]--><span class="fs11lh1-5 ff1">·</span><span class="fs11lh1-5 ff1"> &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
 &nbsp;</span><!--[endif]--><span class="fs11lh1-5 ff2">Following a similar National
 &nbsp;Security Determination in December, and a follow-up Determination in January,
 &nbsp;the FCC recently added the following to the Covered List: “Uncrewed aircraft
 &nbsp;systems (UAS) and UAS critical components produced in a foreign country††
 &nbsp;—except, &nbsp;(a) </span><span class="fs11lh1-5 ff2">UAS</span><span class="fs11lh1-5 ff2"> and </span><span class="fs11lh1-5 ff2">UAS
 &nbsp;critical components</span><span class="fs11lh1-5 ff2"> included on the Defense Contract
 &nbsp;Management Agency’s (DCMA’s) Blue UAS Cleared List, until January 1, 2027,</span><sup><span class="fs11lh1-5 ff2">#</span></sup><span class="fs11lh1-5 ff2"> &nbsp;(b)
 &nbsp;UAS critical components that qualify as “domestic end products” under the Buy
 &nbsp;American Standard, </span><span class="fs11lh1-5 ff2">48
 &nbsp;CFR 25.101(a)</span><span class="fs11lh1-5 ff2">, until January 1, 2027; and (c) </span><span class="fs11lh1-5 ff2">devices
 &nbsp;which have been granted a Conditional Approval by DoW or DHS</span><span class="fs11lh1-5 ff2">—and
 &nbsp;all communications and video surveillance equipment and services listed in
 &nbsp;Section 1709(a)(1) of the </span><span class="fs11lh1-5 ff2">FY25
 &nbsp;National Defense Authorization Act</span><span class="fs11lh1-5 ff2"> (Pub. L.
 &nbsp;118-159)”.</span><b></b></div>
 &nbsp;<div><b><span class="fs11lh1-5 ff2"> </span></b></div>
 &nbsp;<div><b><span class="fs11lh1-5">What does this mean? </span></b></div>
 &nbsp;<div><span class="fs11lh1-5 ff2"> </span></div>
 &nbsp;<div><!--[if !supportLists]--><span class="fs11lh1-5 ff1">·</span><span class="fs11lh1-5 ff1"> &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
 &nbsp;</span><!--[endif]--><b><u><span class="fs11lh1-5 ff2">New</span></u></b><b><span class="fs11lh1-5 ff2">
 &nbsp;</span></b><span class="fs11lh1-5 ff2">devices
 &nbsp;on the Covered List, such as foreign-made consumer-grade routers, are
 &nbsp;prohibited from receiving FCC authorization and are therefore prohibited from
 &nbsp;being imported for use or sale in the U.S. </span><span class="fs11lh1-5 ff2"> </span><span class="fs11lh1-5 ff2">This update to the Covered List does not
 &nbsp;prohibit the import, sale, or use of any existing device models the FCC
 &nbsp;previously authorized. </span></div>
 &nbsp;<div><!--[if !supportLists]--><span class="fs11lh1-5 ff1">·</span><span class="fs11lh1-5 ff1"> &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
 &nbsp;</span><!--[endif]--><b><span class="fs11lh1-5 ff2">This action does not affect any
 &nbsp;previously-purchased consumer-grade routers. </span><span class="fs11lh1-5 ff2"> </span></b><span class="fs11lh1-5 ff2">Consumers can continue
 &nbsp;to use any router they have already lawfully purchased or acquired. </span></div>
 &nbsp;<div><!--[if !supportLists]--><span class="fs11lh1-5 ff1">·</span><span class="fs11lh1-5 ff1"> &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
 &nbsp;</span><!--[endif]--><span class="fs11lh1-5 ff2">Producers of consumer-grade routers
 &nbsp;that receive </span><b><span class="fs11lh1-5 ff2">Conditional Approval</span></b><span class="fs11lh1-5 ff2"> from DoW or DHS can continue to
 &nbsp;receive FCC equipment authorizations. </span><span class="fs11lh1-5 ff2"> </span><span class="fs11lh1-5 ff2">Interested applicants are encouraged to
 &nbsp;submit </span><span class="fs11lh1-5 ff2">applications</span><span class="fs11lh1-5 ff2">
 &nbsp;to </span><span class="fs11lh1-5 ff2">conditional-approvals@fcc.gov</span><span class="fs11lh1-5 ff2">.</span></div>
 &nbsp;<div><span class="fs11lh1-5"> </span></div>
 &nbsp;<div><b><span class="fs11lh1-5">For more information,
 &nbsp;please see our </span></b><b><span class="fs11lh1-5">FAQ page</span></b><b><span class="fs11lh1-5">.</span></b></div>
 &nbsp;<div><span class="fs11lh1-5"> </span></div>
 &nbsp;<div class="imTACenter"><span class="fs11lh1-5">###</span></div>
 &nbsp;<div class="imTACenter"><br><span class="fs11lh1-5">
 &nbsp;</span><b><span class="fs11lh1-5">Media Contact: MediaRelations@fcc.gov / (202) 418-0500</span></b></div>
 &nbsp;<div class="imTACenter"><b><span class="fs11lh1-5">@FCC / </span></b><b><span class="fs11lh1-5">www.fcc.gov</span></b><b></b></div>
 &nbsp;<div class="imTACenter"><b><span class="fs9lh1-5"> </span></b></div>
 &nbsp;<div class="imTACenter"><i><span class="fs9lh1-5">This is an unofficial announcement of Commission
 &nbsp;action.</span><span class="fs9lh1-5"> &nbsp;</span><span class="fs9lh1-5">Release of the full text of a
 &nbsp;Commission order constitutes official action.</span><span class="fs9lh1-5"> 
 &nbsp;</span><span class="fs9lh1-5">See MCI v. FCC, 515 F.2d 385 (D.C. Cir. 1974).</span></i></div>
 &nbsp;<div class="imTACenter"><b><i><span class="fs11lh1-5"> </span></i></b></div></div></div>]]></description>
			<pubDate>Wed, 25 Mar 2026 22:02:00 GMT</pubDate>
			<link>https://litecom.net/blog/?-everything-you-need-to-know-about-the-new-fcc-router-ruling--</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/000000020</guid>
		</item>
		<item>
			<title><![CDATA[Paycom Data Breach]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=Cyber_Security"><![CDATA[Cyber Security]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_00000001D"><div><span class="fs14lh1-5">- <a href="https://www.classaction.org/news/paycom-payroll-data-breach-lawsuit-claims-hacker-stole-thousands-by-re-routing-direct-deposits#embedded-document" target="_blank" class="imCssLink">ClassAction.org</a> - Newswire - by Corrado Rizzi</span></div><div>Paycom Data Breach April 2023</div><div><br></div><div> &nbsp;Paycom Payroll faces a class action lawsuit over a 2023 data breach &nbsp;during which an unknown party accessed the company’s systems and stole &nbsp;thousands from customers’ accounts. &nbsp;<div><br></div><div> &nbsp;Paycom - Payroll faces a proposed class action lawsuit over an April 2023 &nbsp;data breach during which an unknown party accessed the company’s systems &nbsp;and stole thousands from Paycom customers’ accounts by re-routing their &nbsp;direct deposits to unknown accounts.<div><div><div> &nbsp;The 49-page Paycom Payroll data breach lawsuit says &nbsp;that the party or parties responsible for infiltrating the online &nbsp;payroll and human resources company’s systems “still have access to &nbsp;Paycom’s network” and thus access to customers’ personally identifiable information. &nbsp;Per the case, Paycom services thousands of employers nationwide and &nbsp;collects in the course of its business Social Security numbers, &nbsp;addresses, dates of birth, phone numbers, financial account numbers and &nbsp;more.</div> <div>“As such, Defendant assumed the legal and equitable duties &nbsp;to those individuals to protect and safeguard that information from &nbsp;unauthorized access,” the suit emphasizes. </div> <div>According to the &nbsp;complaint, Paycom in May of last year began to receive reports that &nbsp;unknown actors were accessing individuals’ personal Paycom accounts and &nbsp;re-routing their direct deposits elsewhere. </div> <div>Despite this, the lawsuit says, Paycom has failed to notify proposed class members of &nbsp;the data breach, leaving the consumers to discover the intrusion on &nbsp;their own only after “it was too late and unknown persons had already &nbsp;stolen their hard-earned paychecks.” </div> <div> &nbsp;“Due to Defendant’s &nbsp;negligence, cybercriminals obtained everything they need to commit &nbsp;identity theft and continue wreaking havoc on the financial and personal &nbsp;lives of thousands of individuals,” the filing states, noting that &nbsp;Paycom data breach victims will likely have to deal with the threat of identity theft and fraud for the rest of their lives. </div> <div> &nbsp;To &nbsp;date, the root cause of the Paycom data breach, the vulnerabilities &nbsp;exploited and the measures potentially taken to ensure another &nbsp;cyberattack does not happen in the future have not been shared with the &nbsp;public or regulators, the case says. </div> <div>Each of the suit’s three &nbsp;plaintiffs claims to have had more than $1,300 stolen after the hackers &nbsp;accessed their account and changed their direct deposit information. </div> <div>The &nbsp;lawsuit looks to cover all persons whose Paycom accounts were accessed &nbsp;by unauthorized parties between April 2023 and the present. </div></div></div></div></div><div><br></div><div><br></div></div>]]></description>
			<pubDate>Thu, 09 May 2024 02:25:00 GMT</pubDate>
			<enclosure url="https://Litecom.net/blog/files/large-7065116_thumb.png" length="234597" type="image/png" />
			<link>https://litecom.net/blog/?paycom-data-breach</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/00000001D</guid>
		</item>
		<item>
			<title><![CDATA[Credit Freeze]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=Cyber_Security"><![CDATA[Cyber Security]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_00000001C"><div>How to Freeze, or Un-Freeze and Protect your Credit Bureaus.</div><div> &nbsp;First, lets discuss this briefly. Have you ever wondered why your Credit Bureaus are unlocked by default? Great question, because they should be locked by default, thus preventing thieves from accessing your credit to obtain credit cards and accounts in your good name.</div><div><br></div><div> &nbsp;Here we have provided access to secure that information, for FREE.</div><div><br></div><div> &nbsp;Y<span class="fs14lh1-5">ou will create an account at each Bureau. You will not need to enter a credit card or payment method unless you so wish to take on additional services. Once created, you will create a PIN used to unlock them in the event you need to for some reason.</span></div><div><span class="fs14lh1-5"> &nbsp;If you need to apply for credit, you will be able to "Un-Freeze or Thaw" your Bureau's for a period of time which you designate.</span></div><div><span class="fs14lh1-5"> You can schedule a "Thaw", which is a determined time, in which the "Freeze" will automatically go back into effect.</span></div><div><span class="fs14lh1-5"> &nbsp;The following links are direct access to the Bureaus.</span></div><div><br></div><div><a href="https://www.experian.com/freeze/center.html" target="_blank" class="imCssLink">Experian</a></div><div><br></div><div><a href="https://www.equifax.com/personal/credit-report-services/credit-freeze/" target="_blank" class="imCssLink">Equifax</a></div><div><br></div><div><a href="https://www.transunion.com/credit-freeze" target="_blank" class="imCssLink">TransUnion</a></div><div><br></div></div>]]></description>
			<pubDate>Fri, 12 Apr 2024 02:01:00 GMT</pubDate>
			<link>https://litecom.net/blog/?credit-freeze</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/00000001C</guid>
		</item>
		<item>
			<title><![CDATA[Windows Copilot]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=Computers"><![CDATA[Computers]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_00000001B"><div>Firstly, you must have at least the "PRO" version in order to do this.</div><div>You must disable it thru "Group Policy Editor".</div><div> &nbsp;From the search window on the tool bar, Type "GPO"</div><div><br></div><div>Next, in the left hand screen look for "<span class="fs14lh1-5"><b>User Configuration</b></span>"</div><div><br></div><div> <span class="fs14lh1-5"><b>User Configuration &gt; Administrative Templates &gt; Windows 
Components &gt; Windows Copilot </b></span></div><div><br></div><div>Then, 
double-click on, "<span class="fs14lh1-5"><b>Windows Copilot</b></span><span class="fs14lh1-5">"</span></div><div><br></div><div> To turn off Windows Copilot, select "Enabled" to 
remove Copilot entirely. </div><div><br></div><div><br></div></div>]]></description>
			<pubDate>Fri, 22 Mar 2024 16:21:00 GMT</pubDate>
			<link>https://litecom.net/blog/?windows-copilot</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/00000001B</guid>
		</item>
		<item>
			<title><![CDATA[911 and VoIP]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=911_and_VoIP_Services"><![CDATA[911 and VoIP Services]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_00000001A"><div class="imTACenter"><span class="imUl fs14lh1-5"><b>About the Litecom / VoIP 911 / e911 Emergency Services.</b></span></div><div><br></div><div><span class="fs14lh1-5"> Due to the nature and instability of VoIP networks, Litecom cannot and does not guarantee your emergency call will go through or will be answered rapidly. Loss of power, Internet access, high volume of traffic and/or several other</span><span class="fs14lh1-5"> </span><img class="image-0" src="https://Litecom.net/images/large-99143_1z8yneva.png"  width="250" height="250" /><span class="fs14lh1-5">conditions may cause 911 to be inoperable or slow to obtain a response from an operator . We have no control over those types of situations therefore are not held liable. Litecom will do everything within their power to prevent service outages within its network.</span></div><div><br></div><div><span class="fs14lh1-5"> Traditionally, dialing 911 anywhere within the United States and Canada from a business or residential landline routes your call to a local Public Safety Answering Point (PSAP) dispatcher who is trained to aid you in emergency situations by dispatching emergency medical, fire and law enforcement agencies to your location. The dispatcher is instantly provided with your physical address information.</span><img class="image-1" src="https://Litecom.net/images/large-2821623.jpg"  width="250" height="167" /></div><div><br></div><div><span class="fs14lh1-5"> </span><b><span class="fs14lh1-5">VoIP 911 Service differs from traditional 911 services due to limitations brought on by VoIP technology. It is nearly impossible to detect where a call originates from when placed over the internet. e911 allows users to associate physical addresses with their DIDs, allowing them to have service similar to traditional 911.</span></b></div><div><br></div><div><span class="fs14lh1-5"> When an emergency (911) call is placed over a VoIP network, the physical address entered at the time of e911 registration for a specific DID will be passed along to your local PSAP providing the dispatcher with the exact location for that DID. The call will possibly be answered first, by a call taker confirming the address and information then transfer the call to the correct PSAP.</span></div></div>]]></description>
			<pubDate>Fri, 12 Jan 2024 21:40:00 GMT</pubDate>
			<link>https://litecom.net/blog/?911-and-voip</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/00000001A</guid>
		</item>
		<item>
			<title><![CDATA[TikTok]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=Cyber_Security"><![CDATA[Cyber Security]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_000000018"> &nbsp;Early in 2023, Litecom, thru it's Remote Management and Monitoring Service, which uses an AI Security Agent, discovered TikTok code embedded in various companies web sites. Litecom discovered the users information was being relayed to TikTok. This was very alarming. Whom had dropped this code onto companies web sites and why? <div> &nbsp;Litecom began to investigate this finding. </div><div> &nbsp;First, let us go over Litecom's End-Point-Security. Coupled with a Hybrid / AI engine, it monitors computer activity and connections whether the user is active or not. Among many things, it monitors what occurs when you arrive at a web site and what may be occurring in the background.</div><div> &nbsp;So, what we discovered is, as a user arrives at a web site, our Security Agent detected another pathway being opened by the site, directing the user information to TikTok as analytics information. We notified some of these companies.</div><div> After a bit of time, some admitted they inserted the code themselves. This is known as a TikTok Pixel. <span class="fs14lh1-5">TikTok Pixel is a</span><b class="fs14lh1-5"> tracking pixel code on your website to track conversion events</b><span class="fs14lh1-5">. &nbsp;It also helps advertisers track user behavior on their website after &nbsp;clicking on a TikTok ad. It is similar to the tracking pixels used by &nbsp;other social media platforms, such as Facebook Pixel. In our case analysis, there is no advertising, just user data harvesting of some depth. </span></div><div><span class="fs14lh1-5"> &nbsp;Some information collected can be, first and last name, your phone number, email, your computer name.</span></div><div><span class="fs14lh1-5"> &nbsp;So, if your computer protection is lacking, as most are, this transfer is taking place without your knowledge. Our Security Agent notifies the user on their screen the transfer was blocked.</span></div><div><span class="fs14lh1-5"><br></span></div><div><span class="fs14lh1-5"> &nbsp;We are listing some sites which as of 5/18/23 have had this code inserted. </span></div><div><ul><li><span class="fs14lh1-5">Fossil Watches</span></li><li><span class="fs14lh1-5">Square Card</span></li><li><span class="fs14lh1-5">Ray-Ban sunglasses</span></li><li><span class="fs14lh1-5">Adobe</span></li><li><span class="fs14lh1-5">Microsoft</span></li><li><span class="fs14lh1-5">Chipotle</span></li><li><span class="fs14lh1-5">Jack in the Box</span></li><li><span class="fs14lh1-5">Winn-Dixie</span></li></ul><div><span class="fs14lh1-5"><br></span></div></div><div><span class="fs14lh1-5">We found similar results for Instagram. Sites as of 5/18/23</span></div><div><ul><li><span class="fs14lh1-5">Winn-Dixie</span></li></ul></div><div> </div><div> &nbsp;</div></div>]]></description>
			<pubDate>Thu, 18 May 2023 18:01:00 GMT</pubDate>
			<link>https://litecom.net/blog/?tiktok</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/000000018</guid>
		</item>
		<item>
			<title><![CDATA[Web Site - SEO - Make you #1]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=Misc"><![CDATA[Misc]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_000000017"> &nbsp;After 22 years of building or hosting web sites, things have certainly changed. One thing which has not changed is, SEO Companies calling clients, touting they can make them appear on the first page or be #1. The Web sites used to play fair pretty much accross the board, and talent and skill played an important role in good web site building as far SEO went. We used to tell people the Golden Rule, " Remember, there is always a #1 and there can only be one, #1". Now, there is big money in charging people to be on the first page or #1, even though the same Rule applies.<div> Google has pretty much shifted to a, if you do not pay, you will never be found, in respect to key words or industry. As well, they eliminated a page by page result. Now, it is one big long scrolling page. Opps, see how they did that. Now everyone is on Page #1.</div><div> &nbsp;So, before you pay extra to some SEO company for something, remember the Golden Rule.</div></div>]]></description>
			<pubDate>Fri, 28 Apr 2023 00:02:00 GMT</pubDate>
			<link>https://litecom.net/blog/?web-site---seo---make-you--1</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/000000017</guid>
		</item>
		<item>
			<title><![CDATA[Wireless Security - Can't see if from my porch]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=Wireless_Security"><![CDATA[Wireless Security]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_000000016"><div><b><span class="fs14lh1-5 cf1">"Can't see if from my porch"</span></b></div><div><span class="fs14lh1-5"><img class="image-0" src="https://Litecom.net/images/pixabay-bb4c32c99d2c4650.jpg"  width="300" height="225" /><b><br></b><b><br></b><b><span class="cf1">We often think, if I cannot see it, then there is no problem.</span><br></b>This article actually covers not only open wireless access, but password provided wireless access as well.<br>When you provide the password, the users machine remembers the password fore-ever.<br>If you are using your internet to provide guest access, then you should especially consider a business class solution. You will not find these solutions at the local technology store.<br>For guest access solutions and information, visit our "Guest Access Solutions Page".<br>The article below covers several situations. Please read carefully and completely. It will provide a whole different outlook, even on the homefront.<br><span class="cf2">***************************************************</span></span></div><div><div><span class="fs14lh1-5"><i>By CAROLYN THOMPSON, Associated Press &nbsp;Carolyn Thompson, Associated Press &nbsp;</i>– Sun Apr 24, 3:35 pm ET<br>BUFFALO, N.Y. – Lying on his family room floor with assault weapons trained on him, shouts of "pedophile!" and "pornographer!" stinging like his fresh cuts and bruises, the Buffalo homeowner didn't need long to figure out the reason for the early morning wake-up call from a swarm of federal agents.<br>That new wireless router. He'd gotten fed up trying to set a password. Someone must have used his Internet connection, he thought.<br>"We know who you are! You downloaded thousands of images at 11:30 last night," the man's lawyer, Barry Covert, recounted the agents saying. They referred to a screen name, "Doldrum."<br>"No, I didn't," he insisted. "Somebody else could have but I didn't do anything like that."<br>"You're a creep ... just admit it," they said.<br>Law enforcement officials say the case is a cautionary tale. Their advice: Password-protect your wireless router.<br>Plenty of others would agree. The Sarasota, Fla. man, for example, who got a similar visit from the FBI last year after someone on a boat docked in a marina outside his building used a potato chip can as an antenna to boost his wireless signal and download an astounding 10 million images of child porn, or the North Syracuse, N.Y., man who in December 2009 opened his door to police who'd been following an electronic trail of illegal videos and images. The man's neighbor pleaded guilty April 12.<br>For two hours that March morning in Buffalo, agents tapped away at the homeowner's desktop computer, eventually taking it with them, along with his and his wife's iPads and iPhones.<br>Within three days, investigators determined the homeowner had been telling the truth: If someone was downloading child pornography through his wireless signal, it wasn't him. About a week later, agents arrested a 25-year-old neighbor and charged him with distribution of child pornography. The case is pending in federal court.<br>It's unknown how often unsecured routers have brought legal trouble for subscribers. Besides the criminal investigations, the Internet is full of anecdotal accounts of people who've had to fight accusations of illegally downloading music or movies.<br>Whether you're guilty or not, "you look like the suspect," said Orin Kerr, a professor at George Washington University Law School, who said that's just one of many reasons to secure home routers.<br>Experts say the more savvy hackers can go beyond just connecting to the Internet on the host's dime and monitor Internet activity and steal passwords or other sensitive information.<br>A study released in February provides a sense of how often computer users rely on the generosity — or technological shortcomings — of their neighbors to gain Internet access.<br>The poll conducted for the Wi-Fi Alliance, the industry group that promotes wireless technology standards, found that among 1,054 Americans age 18 and older, 32 percent acknowledged trying to access a Wi-Fi network that wasn't theirs. An estimated 201 million households worldwide use Wi-Fi networks, according to the alliance.<br>The same study, conducted by Wakefield Research, found that 40 percent said they would be more likely to trust someone with their house key than with their Wi-Fi network password.<br>For some, though, leaving their wireless router open to outside use is a philosophical decision, a way of returning the favor for the times they've hopped on to someone else's network to check e-mail or download directions while away from home .<br>"I think it's convenient and polite to have an open Wi-Fi network," said Rebecca Jeschke, whose home signal is accessible to anyone within range.<br>"Public Wi-Fi is for the common good and I'm happy to participate in that — and lots of people are," said Jeschke, a spokeswoman for the Electronic Frontier Foundation, a San Francisco-based nonprofit that takes on cyberspace civil liberties issues.<br>Experts say wireless routers come with encryption software, but setting it up means a trip to the manual.<br>The government's Computer Emergency Readiness Team recommends home users make their networks invisible to others by disabling the identifier broadcasting function that allows wireless access points to announce their presence. It also advises users to replace any default network names or passwords, since those are widely known, and to keep an eye on the manufacturer's website for security patches or updates.<br>People who keep an open wireless router won't necessarily know when someone else is piggybacking on the signal, which usually reaches 300-400 feet, though a slower connection may be a clue.<br>For the Buffalo homeowner, who didn't want to be identified, the tip-off wasn't nearly as subtle.<br>It was 6:20 a.m. March 7 when he and his wife were awakened by the sound of someone breaking down their rear door. He threw a robe on and walked to the top of the stairs, looking down to see seven armed people with jackets bearing the initials I-C-E, which he didn't immediately know stood for Immigration and Customs Enforcement.<br>"They are screaming at him, 'Get down! Get down on the ground!' He's saying, 'Who are you? Who are you?'" Covert said.<br>"One of the agents runs up and basically throws him down the stairs, and he's got the cuts and bruises to show for it," said Covert, who said the homeowner plans no lawsuit. When he was allowed to get up, agents escorted him and watched as he used the bathroom and dressed.<br>The homeowner later got an apology from U.S. Attorney William Hochul and Immigration and Customs Enforcement Special Agent in Charge Lev Kubiak.<br>But this wasn't a case of officers rushing into the wrong house. Court filings show exactly what led them there and why.<br>On Feb. 11, an investigator with the Department of Homeland Security, which oversees cybersecurity enforcement, signed in to a peer-to-peer file sharing program from his office. After connecting with someone by the name of "Doldrum," the agent browsed through his shared files for videos and images and found images and videos depicting children engaged in sexual acts.<br>The agent identified the IP address, or unique identification number, of the router, then got the service provider to identify the subscriber.<br>Investigators could have taken an extra step before going inside the house and used a laptop or other device outside the home to see whether there was an unsecured signal. That alone wouldn't have exonerated the homeowner, but it would have raised the possibility that someone else was responsible for the downloads.<br>After a search of his devices proved the homeowner's innocence, investigators went back to the peer-to-peer software and looked at logs that showed what other IP addresses Doldrum had connected from. Two were associated with the State University of New York at Buffalo and accessed using a secure token that UB said was assigned to a student living in an apartment adjacent to the homeowner. Agents arrested John Luchetti March 17. He has pleaded not guilty to distribution of child pornography.</span></div><div><span class="fs14lh1-5"><br></span></div><div><b class="fs14lh1-5"><span class="cf3">Luchetti is not charged with using his neighbor's Wi-Fi without permission. Whether it was illegal is up for debate.</span><br></b></div><div><b class="fs14lh1-5"><span class="cf3">"The question," said Kerr, "is whether it's unauthorized access and so you have to say, 'Is an open wireless access point implicitly authorizing users or not?'</span><br></b></div><div><b><span class="fs14lh1-5 cf3">"We don't know," Kerr said. "The law prohibits unauthorized access and it's just not clear what's authorized with an open unsecured wireless."</span></b></div><div><b class="fs14lh1-5"><br></b></div><div><span class="fs14lh1-5"> In Germany, the country's top criminal court ruled last year that Internet users must secure their wireless connections to prevent others from illegally downloading data. The court said Internet users could be fined up to $126 if a third party takes advantage of their unprotected line, though it stopped short of holding the users responsible for illegal content downloaded by the third party.<br>The ruling came after a musician sued an Internet user whose wireless connection was used to download a song, which was then offered on an online file sharing network. The user was on vacation when the song was downloaded.<br><br></span></div></div><div class="imTARight"><b class="fs14lh1-5"><br></b></div><div class="imTACenter"><br></div></div>]]></description>
			<pubDate>Thu, 27 Apr 2023 18:59:00 GMT</pubDate>
			<link>https://litecom.net/blog/?wireless-security---can-t-see-if-from-my-porch</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/000000016</guid>
		</item>
		<item>
			<title><![CDATA[Leadership]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=Misc"><![CDATA[Misc]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_00000000F"><div>Amazing leadership perspective!</div><div><img class="image-0" src="https://Litecom.net/images/wolves.jpg"  width="695" height="420" /><br></div><div><br></div><div>"A group of wolves: The 3 in front are old &amp; sick, they walk in front to set the pace of the running group lest they get left behind.</div><div><br></div><div>The next 5 are the strongest &amp; best, they are tasked to protect the front side if there is an attack.</div><div><br></div><div>The pack in the middle are always protected from any attack.</div><div><br></div><div>The 5 behind them are also among the strongest &amp; best; they are tasked to protect the back side if there is an attack.</div><div><br></div><div>The last one is the LEADER. He ensures that no one is left behind. He keeps the pack unified and on the same path. He is always ready to run in any direction to protect &amp; serves as the 'bodyguard' to the entire group.</div><div>Just in case you wanted to know what it really means to be a true leader. "</div></div>]]></description>
			<pubDate>Mon, 12 Sep 2022 02:46:00 GMT</pubDate>
			<link>https://litecom.net/blog/?leadership</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/00000000F</guid>
		</item>
		<item>
			<title><![CDATA[Skylink vehicle tracking]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=Transportation"><![CDATA[Transportation]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_00000000E"><div>This is similar to LoJack. It is a device hiden in a vehicle to provide tracking and also can shut off the ignition. A few years ago they were aquired by Spereon which also owns LoJack. Most people probably bought their Skylink during a vehicle purchase at a dealership. The product was sold as a "Life Time" product. Since their aquisition Skylink was put to bed with no notification to its customer base. So much for "Life Time". As well, their tracking is 3G and Sprint based. Both of which are also dead. So your Skylink is just sitting there doing nothing now, tied into your ignition system just waiting to cause issues. Great, time to pay the dealership to remove that thing.</div><div> &nbsp;When you call Skylink to complain, they will suggest purchasing a LoJack system. Why purchase something from a company which is not forward looking.</div><div> &nbsp;A great solution is Drone Mobile and a Compustar Remote start and alarm system with GPS tracking. Like a T12 with 4G LTE Model: RFX-2WT12-SS, RFX-P2WT12-SS for example. If you are going to spend that kind of money, just go for the whole kitchen sink. Compustar works to build forward looking equipment with 4G and remote start. </div><div> &nbsp;You can inquire about this and other solutions at Surround Sound of Richardson, in Richardson, Texas.</div></div>]]></description>
			<pubDate>Mon, 07 Feb 2022 20:24:00 GMT</pubDate>
			<link>https://litecom.net/blog/?skylink-vehicle-tracking</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/00000000E</guid>
		</item>
		<item>
			<title><![CDATA[National Do Not Call]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=Telecom"><![CDATA[Telecom]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_00000000B"><div><div>National Do Not Call</div></div><div><span class="fs12lh1-5 cf1 ff1">888-382-1222</span></div><div><span class="fs12lh1-5 cf1 ff1"><br></span></div><div><div><span class="fs12lh1-5 ff1">https://www.ftc.gov/faq/consumer-protection/list-number-national-do-not-call-registry</span></div></div><div><br></div></div>]]></description>
			<pubDate>Wed, 18 Nov 2020 18:19:00 GMT</pubDate>
			<link>https://litecom.net/blog/?national-do-not-call</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/00000000B</guid>
		</item>
		<item>
			<title><![CDATA[Call Before You Dig]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=Misc"><![CDATA[Misc]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_000000008">Call before you DIG.<div><div>800-344-8377</div></div></div>]]></description>
			<pubDate>Mon, 11 Nov 2019 20:28:00 GMT</pubDate>
			<link>https://litecom.net/blog/?call-before-you-dig</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/000000008</guid>
		</item>
		<item>
			<title><![CDATA[Favorites location Microsoft Edge]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=Computers"><![CDATA[Computers]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_000000007"><div>C:\Users\johndoe\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\User\Default\DataStore\Data\nouser1\120712-0049\DBStore</div><div><br></div><div>copy spartan.edb</div></div>]]></description>
			<pubDate>Thu, 12 Apr 2018 23:02:00 GMT</pubDate>
			<link>https://litecom.net/blog/?favorites-location-microsoft-edge</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/000000007</guid>
		</item>
		<item>
			<title><![CDATA[Quotes]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=Quotes"><![CDATA[Quotes]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_000000006">Quotes to learn from:<div><br></div><div>"Don't hold on to a mistake, just because you spent a long time making it"</div></div>]]></description>
			<pubDate>Wed, 11 Apr 2018 13:48:00 GMT</pubDate>
			<link>https://litecom.net/blog/?quotes</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/000000006</guid>
		</item>
		<item>
			<title><![CDATA[Do I need a UPS?]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=The_Water_Cooler"><![CDATA[The Water Cooler]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_000000014"><div><span class="fs14lh1-5">Real story from the Archives:</span><span class="fs14lh1-5"> </span></div><div><span class="fs14lh1-5"> </span></div> &nbsp;<div><span class="fs14lh1-5">A client called and said, “My computer has a Blue screen. “</span><span class="fs14lh1-5"> </span></div><div><span class="fs14lh1-5"> </span></div> &nbsp;<div><span class="fs14lh1-5">The color Blue described, did not sound like a virus.</span><span class="fs14lh1-5"> </span></div><div><span class="fs14lh1-5"> </span></div> &nbsp;<div><span class="fs14lh1-5">So, we asked, “What happened.”</span></div><div><span class="fs14lh1-5"> </span></div><div><span class="fs14lh1-5">They answered,</span></div> &nbsp;<div><span class="fs14lh1-5"> “I came in, powered up the PC as I do every morning and went to make coffee. While making coffee, there was a power surge / brown out. After making the coffee and pouring a cup, I went to my PC, and there was a Blue screen.”</span></div><div><img class="image-0 fright" src="https://Litecom.net/images/large-309523.png"  width="225" height="207" /><span class="fs14lh1-5"><br></span></div> &nbsp;<span class="fs14lh1-5">The verdict, Corrupted Hard Drive, Master Boot Record. After removing the hard drive and repairing it, the data was recoverable, but it would never run a PC again.</span><div><span class="fs14lh1-5"><br></span></div> &nbsp;<span class="fs14lh1-5">After Travel and labor charges to diagnose, </span><span class="fs14lh1-5">recover files from old hard drive after repairing it,</span><span class="fs14lh1-5"> return to site, replace with new PC, reload client specific utilities and peripherals no longer available or supported, $$$+. All this over a 2-week time frame.</span><div><span class="fs14lh1-5"><br></span></div><div><span class="fs14lh1-5">The moral of the story, get a UPS. You will spend between $150.00 to $275.00 or more on a UPS.</span><span class="fs14lh1-5"> </span></div><div class="imTACenter"><span class="fs14lh1-5">But you will never know what you missed.</span></div></div>]]></description>
			<pubDate>Mon, 02 Apr 2018 18:48:00 GMT</pubDate>
			<link>https://litecom.net/blog/?do-i-need-a-ups-</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/000000014</guid>
		</item>
		<item>
			<title><![CDATA[Meltdown and Spectre]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=Computers"><![CDATA[Computers]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_000000002"><div>Summary</div><div>On January 2, 2018, reports surfaced of a serious design flaw in Intel CPUs that could permit attackers to gain unathorized access to a computer's memory. Named "Meltdown" and "Spectre", these vulnerabilties require an update at the operating system level to fix.</div><div><br></div><div>All modern computers with Intel chips reportedly produced in the last 10 years appear to be affected, including those running Windows and Linux.</div><div><br></div><div>Update: January 5, 2018 - Released the following detection for attempts to exploit the Multiple CPU Hardwares Information Disclosure Vulnerability (CVE-2017-5753/Spectre):</div><div>Exp.CVE-2017-5753</div></div>]]></description>
			<pubDate>Sun, 07 Jan 2018 17:17:00 GMT</pubDate>
			<link>https://litecom.net/blog/?meltdown-and-spectre</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/000000002</guid>
		</item>
		<item>
			<title><![CDATA[Krack AttaCK Manufacturers affected Equipment lists]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=Wireless_Security"><![CDATA[Wireless Security]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_000000000"><div>Manufacturers affected list and comments can be found here. </div><div><br></div><div>CERT / Software Engineering Institute / Carnegie Mellon University.</div><div>Homeland Security</div><div><br></div><div><a href="http://www.kb.cert.org/vuls/byvendor?searchview&Query=FIELD+Reference=228519&SearchOrder=4" target="_blank" class="imCssLink">http://www.kb.cert.org/</a></div></div>]]></description>
			<pubDate>Tue, 21 Nov 2017 15:46:00 GMT</pubDate>
			<link>https://litecom.net/blog/?krack-attack-equipment-lists</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/000000000</guid>
		</item>
		<item>
			<title><![CDATA[Wireless Security - KracAttaCK]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=Wireless_Security"><![CDATA[Wireless Security]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_000000015"><div class="imTARight"><span class="fs14lh1-5">Published - 10/16/2017</span></div><div class="imTACenter"><b><span class="fs14lh1-5">WPA and WPA2</span></b></div><div class="imTACenter"><b><span class="imUl fs14lh1-5 cf1">KracAttaCK</span></b></div><div class="imTACenter"><br></div><div><span class="fs14lh1-5">You may have heard the news recently released on Monday, 10/16/2017,regarding wireless security.</span></div><div><img class="image-0 fright" src="https://Litecom.net/images/pixabay-bb483ecd982f4f435e_5uztg0t0.jpg"  width="300" height="200" /></div><div><br></div><div><span class="fs14lh1-5">The report is known as "KrackAttaCK" (Key Reinstallation AttaCKs).</span></div><div><br></div><div><span class="fs14lh1-5">There are many news reports coming from this. One of the myths spreading already, is that if you access a site using secure protocol, HTTPS, you are safe. This is simply not true.</span></div><div><br></div><div><span class="fs14lh1-5"> The fix has 2 sides.</span></div><div><br></div><div><span class="fs14lh1-5">1. Protect your own network and site. The wireless equipment must be upgraded, replaced or patched. This is manufacturer dependant, on what they will do. Many manufactures will be late to the game, if ever arriving at all. It is likely older equipment will never be patched. WPA and WPA2 were released in 2003 / 2004 as an "Industry Standard Security Protocol", and is not a manufacturer specific software code.</span><span class="fs14lh1-5"> </span><span class="fs14lh1-5">The weaknesses are in the Wi-Fi standard itself, and not in individual products or implementations. Therefore, any correct implementation of WPA2 is likely affected. To prevent the attack, users must update affected products as soon as security updates become available. Note that if your device supports Wi-Fi, it is most likely affected.</span><span class="fs14lh1-5"> </span><span class="fs14lh1-5">There is a lot of unsupported legacy equipment out there, to say the least, using WPA and WPA2.</span></div><div><br></div><div><b><span class="fs14lh1-5 cf2"> Litecom's</span></b><span class="fs14lh1-5"> </span><span class="fs14lh1-5">currently deployed enterprise wireless solution manufacturer, has already generated a software update to mitigate the issue, from the wireless manufacturers standpoint. New</span><span class="fs14lh1-5"> </span><b><span class="fs14lh1-5 cf2">Litecom</span><span class="fs14lh1-5 cf2"> </span></b><span class="fs14lh1-5">installations from 10/19/2017 forward, will include the fix as stream line.</span></div><div><br></div><div><b><span class="fs14lh1-5 cf3">Please open a ticket thru the</span><span class="fs14lh1-5 cf3"> </span><span class="fs14lh1-5 cf3">ticket portal</span><span class="fs14lh1-5 cf3">, if you wish to have the update applied, or your current wireless solution evaluated or replaced. This is highly recommended.</span></b></div><div><br></div><div><span class="fs14lh1-5">2. Based on reports, Keep your computers at current OS, and update levels.</span><br></div><div><span class="fs14lh1-5">If you are a current</span><span class="fs14lh1-5"> </span><b><span class="fs14lh1-5 cf2">Litecom RMM</span><span class="fs14lh1-5 cf2"> </span></b><span class="fs14lh1-5">Customer, we are already taking care of this for you.</span></div><div class="imTACenter"><b><span class="fs14lh1-5 cf2">Litecom</span></b><span class="fs14lh1-5"> </span><span class="fs14lh1-5">recommends our</span><span class="fs14lh1-5"> </span><b><span class="fs14lh1-5 cf2">RMM enterprise service</span></b></div><div class="imTACenter"><b><span class="fs14lh1-5 cf4">We recommend</span><span class="fs14lh1-5 cf4"> </span></b><b><span class="fs14lh1-5 cf2">Litecom</span></b><b><span class="fs14lh1-5 cf4"> </span><span class="fs14lh1-5 cf4">performing a complete network evaluation for security risks.</span></b></div><div class="imTACenter"><br></div><div><span class="fs14lh1-5">You can review the Mid-Level document describing the issue at,</span><span class="fs14lh1-5"> </span><span class="fs14lh1-5">https://www.krackattacks.com</span><span class="fs14lh1-5">/</span><span class="fs14lh1-5"> </span><span class="fs14lh1-5">from the engineer (Discovered by Mathy Vanhoef of imec-DistriNet, KU Leuven) whom discovered the issue.</span></div><div><br></div><div><b><span class="fs14lh1-5 cf3">Please open a ticket thru the</span><span class="fs14lh1-5 cf3"> </span><span class="fs14lh1-5 cf3">ticket portal</span><span class="fs14lh1-5 cf3">, if you wish to have the update applied, or your current wireless solution evaluated or replaced. This is highly recommended.</span></b></div><div><b><br></b></div><div><b><span class="imUl fs14lh1-5 cf4">We recommend</span><span class="imUl fs14lh1-5 cf4"> </span></b><b><span class="imUl fs14lh1-5 cf2">Litecom</span></b><span class="imUl fs14lh1-5"> </span><b><span class="imUl fs14lh1-5 cf4">performing a complete network evaluation for security risks.</span></b></div></div>]]></description>
			<pubDate>Mon, 16 Oct 2017 14:00:00 GMT</pubDate>
			<link>https://litecom.net/blog/?wireless-security---kracattack</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/000000015</guid>
		</item>
		<item>
			<title><![CDATA[Anti-Virus]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=Computers"><![CDATA[Computers]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_b5fm1v76"><div> &nbsp;</div><div><div>Myth: All Anti-Virus software is the same.</div><div>False: Each Anti-Virus product is different in some way. Some are better than others, and most certainly not created equal.</div><div><br></div><div>Myth: Since I have Anti-Virus software loaded, I can do whatever I want, and surf worry free, knowing I am protected.</div><div>False: Anti-Virus software is never full proof. It provides extra security, but cannot fully protect your machine, from you.</div><div><br></div><div>Think of Anti-Virus software as seat belts and airbags:</div><div>Equipping vehicles with seatbelts and airbags reduce injury, and in some cases prevent injury, but no guarantee implied you will never be injured. You must always be careful where and how you drive.</div><div><br></div><div><br></div><div>No “ONE” Anti-Virus software is 100%. Remember, you are the driver.</div></div><div></div></div>]]></description>
			<pubDate>Thu, 17 Mar 2016 20:39:00 GMT</pubDate>
			<link>https://litecom.net/blog/?anti-virus</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/b5fm1v76</guid>
		</item>
		<item>
			<title><![CDATA[Computer MTU]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=Computers"><![CDATA[Computers]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_iqsrzm5u">For technical reference only!!!<div>ping xxx.xxx.com -f -l 1xxx</div><div>add 28</div></div>]]></description>
			<pubDate>Sat, 06 Feb 2016 19:45:00 GMT</pubDate>
			<link>https://litecom.net/blog/?computer-mtu</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/iqsrzm5u</guid>
		</item>
		<item>
			<title><![CDATA[Litecom supports The Greater Dallas Alzheimer’s Association.]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=Litecom_Supports"><![CDATA[Litecom Supports]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_8n06h1ux"><div class="imTALeft"><span class="fs11lh1-5">Litecom supports The Greater Dallas Alzheimer’s Association.</span></div></div>]]></description>
			<pubDate>Mon, 12 Oct 2015 00:06:00 GMT</pubDate>
			<link>https://litecom.net/blog/?litecom-supports-the-greater-dallas-alzheimer-s-association-</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/8n06h1ux</guid>
		</item>
		<item>
			<title><![CDATA[Cisco CCENT / CCNA]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=Network_Engineering"><![CDATA[Network Engineering]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_4269a84s"><div class="imTALeft"><span class="fs14lh1-5">The CCENT and CCNA.</span></div><div class="imTALeft"><span class="fs14lh1-5"><br></span><div><span class="fs14lh1-5"> &nbsp;Introduced in June 2007, the CCENT is a stepping stone to the CCNA. Prior to 2007 the CCNA exam was multiple choice. &nbsp;&nbsp;After 2007 the exam was administered as mostly a "Lab Simulator", meaning, the test question would say, "There is a network issue, log in and fix it. Click next when you are done".<br></span><span class="fs14lh1-5"> &nbsp;The CCNA exam is a timed test taken at a secure facility, and is not allowed to be administered by any educational institute where CCNA materials are taught. The CCNA is only obtained thru one of these secure testing centers by appointment only. The exam carries an 85% failure rate accross the board.<br> </span><span class="fs14lh1-5">It is an extremely tough test.</span></div></div></div>]]></description>
			<pubDate>Wed, 07 Oct 2015 18:24:00 GMT</pubDate>
			<enclosure url="https://Litecom.net/blog/files/pixabay-bb483ecf9f274f405e_thumb.png" length="403936" type="image/png" />
			<link>https://litecom.net/blog/?cisco-ccent---ccna</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/4269a84s</guid>
		</item>
		<item>
			<title><![CDATA[What does F.O.C. mean when porting a phone number?]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=VoIP"><![CDATA[VoIP]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_w5y6ad9e"><div class="imTALeft"><span class="fs14lh1-5">An F.O.C. (or Firm Order Commitment) FOC Date is when the local carrier will commit to having the circuit you ordered provisioned and physically ready to go. Frequently there are additional steps before the circuit is ready for turn up.</span><span class="fs14lh1-5"><br></span><span class="fs14lh1-5">When porting a number, neither the winning carrier or losing carrier have any control over the F.O.C. Date. There is an entity in control in the middle which verifys the information. There is NO WAY to have a phone conversation or "White Glove" the port. This is a security feature built into the process. So do not be mad at anyone and accuse them of "Blocking your port out". </span><span class="fs14lh1-5"><br></span><div class="mt1"><span class="fs14lh1-5">It takes experience and knowledge for a successful port and sometimes you need the professional services company such as Litecom to assist in this process.</span></div></div></div>]]></description>
			<pubDate>Fri, 21 Aug 2015 13:25:00 GMT</pubDate>
			<link>https://litecom.net/blog/?what-does-f-o-c--mean-when-porting-a-phone-number-</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/w5y6ad9e</guid>
		</item>
		<item>
			<title><![CDATA[Adware, Malware]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=Computers"><![CDATA[Computers]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_ct133e46"><div class="imTALeft"><span class="fs14lh1-5 cf1">Ever notice the computer browser acts as though it has stalled when hitting the back button?<br></span><span class="fs14lh1-5 cf1">Right click on the back button, and it will show where you are being redirected.</span></div></div>]]></description>
			<pubDate>Fri, 27 Feb 2015 16:03:00 GMT</pubDate>
			<link>https://litecom.net/blog/?adware,-malware</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/ct133e46</guid>
		</item>
		<item>
			<title><![CDATA[Cable Found ]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=Just_for_Fun"><![CDATA[Just for Fun]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_deys4oz7"><div class="imTALeft"><span class="fs14lh1-5"><span class="cf1">Just for fun.<br> </span></span><div class="imTALeft"><span class="fs14lh1-5">Cable Found:<br></span><div class="imTALeft"><span class="fs14lh1-5">After digging to a depth of 10 feet last year outside Buffalo, New York, scientists found traces of copper &nbsp;cable dating back 100 years. They came to the conclusion that their ancestors already had a telephone network more than 100 years ago.<br></span><div class="imTALeft"><span class="fs14lh1-5">Not to be outdone by the New Yorkers, in the weeks that followed, a Los Angeles, California archaeologist dug to a depth of 20 feet somewhere just outside Oceanside. Shortly afterward, a story in the LA Times read, &nbsp;&nbsp;"California archaeologists, reporting a finding of 200 year old copper cable, have concluded that their ancestors already had an advanced high-tech communications network a hundred years earlier than the New Yorkers."<br></span><div><span class="fs14lh1-5">One week later, a local newspaper in Omaha Nebraska reported, "After digging 30 feet deep in his pasture near the community of Ainsworth, Nebraska, Ole Olson, a heck of an engineer and a self-taught archaeologist, reported that he &nbsp;found absolutely nothing. Ole has therefore concluded that 300 years ago,Nebraska had already gone wireless."<br></span><span class="fs14lh1-5">Just makes a person proud to be from Nebraska.</span></div></div></div></div></div></div>]]></description>
			<pubDate>Thu, 18 Dec 2014 13:43:00 GMT</pubDate>
			<link>https://litecom.net/blog/?cable-found-</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/deys4oz7</guid>
		</item>
		<item>
			<title><![CDATA[VoIP Hosting vs. on site IP / PBX]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=VoIP_Services"><![CDATA[VoIP Services]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_y7ekw7zg"><p class="imTALeft"></p><div><span class="fs14lh1-5">To Host, or Not to Host, that is the question.<br>It is a very good question indeed.<br> The reality is, there is no straight forward answer here. Each business has its own objective. It is important to have a productive discussion with your CPE vendor or paid consultant, and explore the costs assosiated with hosting, or an On-Site IP/PBX.</span></div><p></p></div>]]></description>
			<pubDate>Mon, 08 Sep 2014 03:45:00 GMT</pubDate>
			<link>https://litecom.net/blog/?voip-hosting-vs--on-site-ip---pbx</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/y7ekw7zg</guid>
		</item>
		<item>
			<title><![CDATA[What is a CPE Vendor?]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=CPE_Vendor"><![CDATA[CPE Vendor]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_te63jqyv"><div><span class="fs14lh1-5"> What is a CPE Vendor?<br></span></div><div><div><span class="fs14lh1-5"> CPE stands for, Customer Premise Equipment. The CPE Vendor works for the end user / buyer, on their behalf.<br></span></div><div><span class="fs14lh1-5">Example 1: A business needs to purchase or needs assistance with their phone system, network or computer needs. They hire or utilize the prefessional services of a CPE Vendor. Since the CPE vendor performs these functions on a day to day basis, they are more equiped and knowledgable on the products which will meet the customers needs.<br></span></div><div><span class="fs14lh1-5">Example 2: The CPE Vendor as a consultant. The end user is having trouble with their phone or internet service. The provider does not find an issue with their equipment, and suggests the end user call their CPE vendor. The end user believes the provider is working to resolve the issue, but in fact, they are working to rule out their equipment as the problem. The end user becomes frustrated because of the misconception the provider is supposed to fix the issue, when indeed, it is the end user whom most of the time, must troubleshoot their own equipment, in order to rule out the (their equipment) "CPE", and thus argue with the provider, of where the fix, or issue lies.<br></span></div><div><span class="fs14lh1-5"><br> This is where the CPE Vendor comes into the picture. The CPE vendor has more leverage as a professional services company, with knowledgeable staff, works on behalf of the end user, and paid by the end user, to act on the end user’s behalf. The providers are more likely to work with a CPE Vendor, because they are not emotionaly attached. Thus eliminating emotional non productive time, and actually, technically working the issue based on facts.</span><br></div></div></div>]]></description>
			<pubDate>Sun, 20 Jul 2014 23:21:00 GMT</pubDate>
			<link>https://litecom.net/blog/?cpe-vendor</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/te63jqyv</guid>
		</item>
		<item>
			<title><![CDATA[Wireless, WEP is secure, right?]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=Wireless_Security"><![CDATA[Wireless Security]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_1n72hv2l"><p class="imTALeft"></p><div><span class="fs14lh1-5 cf1"> &nbsp;WEP is secure right? Not so fast. Just because you made and know the password means nothing. WEP is NON-PCI Enterprise Compliant.<br></span><div><span class="fs14lh1-5"><span class="cf1">__________________</span><span class="cf1"><br></span></span><div><span class="fs14lh1-5"><span class="cf1"> &nbsp;Wired Equivalent Privacy (WEP) is a weak security algorithm for IEEE 802.11 wireless networks. Introduced as part of the original 802.11 standard ratified in September 1999, its intention was to provide data confidentiality comparable to that of a traditional wired network. WEP, recognizable by the key of 26 or 58 hexadecimal digits, is widely in use and is often the first security choice presented to users by router configuration tools.</span><span class="cf1"><br></span></span><div><span class="fs14lh1-5 cf1">Although its name implies that it is as secure as a wired connection, WEP has been demonstrated to have numerous flaws and has been deprecated in favor of newer standards. In 2003 the Wi-Fi Alliance announced that WEP had been superseded by a higher Wi-Fi standard. In 2004, with the ratification of the full 802.11i standard, the IEEE declared that both WEP-40/64/104/128 "have been deprecated as they fail to meet their security goals".<br></span><div class="mt1"><span class="fs14lh1-5"><span class="cf1">_____________________<br></span><span class="cf2"><b>Conclusion:<br></b></span><span class="cf1"> &nbsp;The algorithm WEP probably should have been done away with years ago, however, many products still in use, such as inventory scanners, are still going strong, and no-where near failure, and still must be supported. Extensive network engineering should be considered and implemented.</span></span></div></div></div></div></div><p></p></div>]]></description>
			<pubDate>Thu, 17 Jul 2014 01:48:00 GMT</pubDate>
			<link>https://litecom.net/blog/?wireless,-wep-is-secure,-right-</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/1n72hv2l</guid>
		</item>
		<item>
			<title><![CDATA[Wireless Security the TJ MAXX Story]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=Wireless_Security"><![CDATA[Wireless Security]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_nd7i97oc"><div class="imTACenter"><div><br></div><div data-text-align="start" style="text-align: start;"><div><b><u><span class="fs14lh1-5">Wireless Security the TJ MAXX Story</span></u></b><br><span class="fs14lh1-5">
</span><!--[if !supportLineBreakNewLine]--><br><span class="fs14lh1-5">
</span><!--[endif]--></div>

<div><span class="fs14lh1-5">Cyber-thieves using a telescoping wireless antenna to
intercept payment information may be responsible for the "biggest data
breach ever," investigators theorize.Related Links</span><br><span class="fs14lh1-5">
</span><!--[if !supportLineBreakNewLine]--><br><span class="fs14lh1-5">
</span><!--[endif]--></div>

<div><span class="fs14lh1-5">Ring Charged with Hacking Major U.S. Retailers.</span><br><span class="fs14lh1-5">
</span><!--[if !supportLineBreakNewLine]--><br><span class="fs14lh1-5">
</span><!--[endif]--></div>

<div><span class="fs14lh1-5">The Wall Street Journal reported that hackers in St. Paul,
Minnesota, parked outside a Marshalls' department store and used the antenna to
decode data between hand-held payment scanners, enabling them to break into
parent company TJX's database and make off with credit and debit card records
of nearly 47 million customers.</span><br><span class="fs14lh1-5">
</span><!--[if !supportLineBreakNewLine]--><br><span class="fs14lh1-5">
</span><!--[endif]--></div>

<div><span class="fs14lh1-5">Drive-by hacking, or "wardriving," was the first
major threat to Internet access over wireless connections. Wardrivers drive by
or park near Wi-Fi hotspots or open networks and use various means to siphon
off data from unsuspecting users.</span><br><span class="fs14lh1-5">
</span><!--[if !supportLineBreakNewLine]--><br><span class="fs14lh1-5">
</span><!--[endif]--></div>

<div><span class="fs14lh1-5">The TJX network was alleged to have less wireless network
security protection than the networks of many home users. The hackers are
believed to have had access to the network for as long as two years, going back
to at least July 2005.</span><br><span class="fs14lh1-5">
TJX was also alleged to be using the older Wireless Equivalent Privacy (WEP)
protocol for its network, which has been largely discredited for the ease with
which it can be broken. Security researchers in Germany recently published a
paper documenting how WEP can be broken in as little as 60 seconds.</span><br><span class="fs14lh1-5">
Most security experts recommend upgrading to the stronger Wi-Fi Protected
Access (WPA) protocol, but TJX was apparently slow to adopt the new system.</span></div>

<div><br><span class="fs14lh1-5">
Although TJX refused to comment on the wardriving allegations, the company
previously acknowledged that it failed to meet security procedures mandated by
the credit card industry. The company admitted to transferring credit card
payment information to banks without any sort of encryption, making it easier
for the wardrivers to pick up the information as they surfed the TJX network.</span><br><span class="fs14lh1-5">
</span><br><span class="fs14lh1-5">
The hackers then most likely sold the purloined customer data in the
underground economy" of black-market chats that specialize in the trading
and selling of personal information. Data connected to the TJX breach turned up
in a Florida fraud case involving credit cards "cloned" with the
stolen personal information.</span><br><span class="fs14lh1-5">
</span><br><span class="fs14lh1-5">
The fraudsters then used the clone cards to purchase gift cards from Wal-Mart,
which they then redeemed for thousands of dollars in high-priced merchandise.</span><br><span class="fs14lh1-5">
</span><br><span class="fs14lh1-5">
Although the TJX corporation claims its strong first-quarter sales numbers show
that its shoppers don't care about the data breach, the company is still
fending off numerous lawsuits from state Attorneys General and class-actions
from irate customers.</span><br><span class="fs14lh1-5">
</span><br><span class="fs14lh1-5">
Most recently, a coalition of banks in Massachusetts, Colorado, and Maine filed
suit against TJX for forcing them to absorb the costs of canceling and
reissuing thousands of credit and debit cards exposed in the breach.</span><br><span class="fs14lh1-5">
</span><br><span class="fs14lh1-5">
The TJX breach has also spurred numerous bills in Congress to mandate stronger
data security standards for both government agencies and private companies, and
to ensure affected individuals are notified if a breach occurs.</span><br><span class="fs14lh1-5">
</span><br><span class="fs14lh1-5">
Related articles</span><br><span class="fs14lh1-5">
</span><br><span class="fs14lh1-5">
TJX To Pay Mastercard $24 Million For Data Breach</span><br><span class="fs14lh1-5">
TJX Settles with FTC Over Data Breach</span><br><span class="fs14lh1-5">
TJX Settles with Banks over Data Breach</span><br><span class="fs14lh1-5">
TJX Settles Visa Suit over Data Breach</span><br><span class="fs14lh1-5">
Attorneys General Oppose TJX Data Breach Settlement</span><br><span class="fs14lh1-5">
TJX Data Breach Victims Reach 94 Million</span></div>

<div><span class="fs14lh1-5"> </span></div></div></div></div>]]></description>
			<pubDate>Thu, 17 Jul 2014 01:46:00 GMT</pubDate>
			<link>https://litecom.net/blog/?wireless-security-the-tj-maxx-story</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/nd7i97oc</guid>
		</item>
		<item>
			<title><![CDATA[Wireless Security Article #1]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=Wireless"><![CDATA[Wireless]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_0w7vbqt1"><p class="imTALeft"></p><div><div><span class="fs14lh1-5">This another reason not to take for granted the knowledge needed to set your wireless up, or most importantly, the why. Not only the "why you should", but, what do each of those options really mean.<br>____________________<br><i>By CAROLYN THOMPSON, Associated Press Carolyn Thompson, Associated Press </i>– Sun Apr 24, 3:35 pm ET <br>BUFFALO, N.Y. – Lying on his family room floor with assault weapons trained on him, shouts of "pedophile!" and "pornographer!" stinging like his fresh cuts and bruises, the Buffalo homeowner didn't need long to figure out the reason for the early morning wake-up call from a swarm of federal agents. <br>That new wireless router. He'd gotten fed up trying to set a password. Someone must have used his Internet connection, he thought. <br>"We know who you are! You downloaded thousands of images at 11:30 last night," the man's lawyer, Barry Covert, recounted the agents saying. They referred to a screen name, "Doldrum." <br>"No, I didn't," he insisted. "Somebody else could have but I didn't do anything like that." <br>"You're a creep ... just admit it," they said. <br>Law enforcement officials say the case is a cautionary tale. Their advice: Password-protect your wireless router. <br>Plenty of others would agree. The Sarasota, Fla. man, for example, who got a similar visit from the FBI last year after someone on a boat docked in a marina outside his building used a potato chip can as an antenna to boost his wireless signal and download an astounding 10 million images of child porn, or the North Syracuse, N.Y., man who in December 2009 opened his door to police who'd been following an electronic trail of illegal videos and images. The man's neighbor pleaded guilty April 12. <br>For two hours that March morning in Buffalo, agents tapped away at the homeowner's desktop computer, eventually taking it with them, along with his and his wife's iPads and iPhones. <br>Within three days, investigators determined the homeowner had been telling the truth: If someone was downloading child pornography through his wireless signal, it wasn't him. About a week later, agents arrested a 25-year-old neighbor and charged him with distribution of child pornography. The case is pending in federal court. <br>It's unknown how often unsecured routers have brought legal trouble for subscribers. Besides the criminal investigations, the Internet is full of anecdotal accounts of people who've had to fight accusations of illegally downloading music or movies. <br>Whether you're guilty or not, "you look like the suspect," said Orin Kerr, a professor at George Washington University Law School, who said that's just one of many reasons to secure home routers. <br>　<br>Experts say the more savvy hackers can go beyond just connecting to the Internet on the host's dime and monitor Internet activity and steal passwords or other sensitive information. <br>A study released in February provides a sense of how often computer users rely on the generosity — or technological shortcomings — of their neighbors to gain Internet access. <br>The poll conducted for the Wi-Fi Alliance, the industry group that promotes wireless technology standards, found that among 1,054 Americans age 18 and older, 32 percent acknowledged trying to access a Wi-Fi network that wasn't theirs. An estimated 201 million households worldwide use Wi-Fi networks, according to the alliance. <br>The same study, conducted by Wakefield Research, found that 40 percent said they would be more likely to trust someone with their house key than with their Wi-Fi network password. <br>For some, though, leaving their wireless router open to outside use is a philosophical decision, a way of returning the favor for the times they've hopped on to someone else's network to check e-mail or download directions while away from home . <br>"I think it's convenient and polite to have an open Wi-Fi network," said Rebecca Jeschke, whose home signal is accessible to anyone within range. <br>"Public Wi-Fi is for the common good and I'm happy to participate in that — and lots of people are," said Jeschke, a spokeswoman for the Electronic Frontier Foundation, a San Francisco-based nonprofit that takes on cyberspace civil liberties issues. <br>Experts say wireless routers come with encryption software, but setting it up means a trip to the manual. <br>The government's Computer Emergency Readiness Team recommends home users make their networks invisible to others by disabling the identifier broadcasting function that allows wireless access points to announce their presence. It also advises users to replace any default network names or passwords, since those are widely known, and to keep an eye on the manufacturer's website for security patches or updates. <br>People who keep an open wireless router won't necessarily know when someone else is piggybacking on the signal, which usually reaches 300-400 feet, though a slower connection may be a clue. <br>For the Buffalo homeowner, who didn't want to be identified, the tip-off wasn't nearly as subtle. <br>It was 6:20 a.m. March 7 when he and his wife were awakened by the sound of someone breaking down their rear door. He threw a robe on and walked to the top of the stairs, <br>　<br>looking down to see seven armed people with jackets bearing the initials I-C-E, which he didn't immediately know stood for Immigration and Customs Enforcement. <br>"They are screaming at him, 'Get down! Get down on the ground!' He's saying, 'Who are you? Who are you?'" Covert said. <br>"One of the agents runs up and basically throws him down the stairs, and he's got the cuts and bruises to show for it," said Covert, who said the homeowner plans no lawsuit. When he was allowed to get up, agents escorted him and watched as he used the bathroom and dressed. <br>The homeowner later got an apology from U.S. Attorney William Hochul and Immigration and Customs Enforcement Special Agent in Charge Lev Kubiak. <br>But this wasn't a case of officers rushing into the wrong house. Court filings show exactly what led them there and why. <br>On Feb. 11, an investigator with the Department of Homeland Security, which oversees cybersecurity enforcement, signed in to a peer-to-peer file sharing program from his office. After connecting with someone by the name of "Doldrum," the agent browsed through his shared files for videos and images and found images and videos depicting children engaged in sexual acts. <br>The agent identified the IP address, or unique identification number, of the router, then got the service provider to identify the subscriber. <br>Investigators could have taken an extra step before going inside the house and used a laptop or other device outside the home to see whether there was an unsecured signal. That alone wouldn't have exonerated the homeowner, but it would have raised the possibility that someone else was responsible for the downloads. <br>After a search of his devices proved the homeowner's innocence, investigators went back to the peer-to-peer software and looked at logs that showed what other IP addresses Doldrum had connected from. Two were associated with the State University of New York at Buffalo and accessed using a secure token that UB said was assigned to a student living in an apartment adjacent to the homeowner. Agents arrested John Luchetti March 17. He has pleaded not guilty to distribution of child pornography. <br>Luchetti is not charged with using his neighbor's Wi-Fi without permission. Whether it was illegal is up for debate. <br>"The question," said Kerr, "is whether it's unauthorized access and so you have to say, 'Is an open wireless point implicitly authorizing users or not?' <br>"We don't know," Kerr said. "The law prohibits unauthorized access and it's just not clear what's authorized with an open unsecured wireless." <br>　<br>In Germany, the country's top criminal court ruled last year that Internet users must secure their wireless connections to prevent others from illegally downloading data. The court said Internet users could be fined up to $126 if a third party takes advantage of their unprotected line, though it stopped short of holding the users responsible for illegal content downloaded by the third party. <br>The ruling came after a musician sued an Internet user whose wireless connection was used to download a song, which was then offered on an online file sharing network. The user was on vacation when the song was downloaded.</span><br><span class="fs12lh1-5 ff1">BUFFALO, N.Y. – Lying on his family room floor with assault weapons trained on him, shouts of "pedophile!" and "pornographer!" stinging like his fresh cuts and bruises, the Buffalo homeowner didn't need long to figure out the reason for the early morning wake-up call from a swarm of federal agents.<br> </span><span class="fs12lh1-5 ff1">That new wireless router. He'd gotten fed up trying to set a password. Someone must have used his Internet connection, he thought.<br> </span><span class="fs12lh1-5 ff1">"We know who you are! You downloaded thousands of images at 11:30 last night," the man's lawyer, Barry Covert, recounted the agents saying. They referred to a screen name, "Doldrum."<br> </span><span class="fs12lh1-5 ff1">"No, I didn't," he insisted. "Somebody else could have but I didn't do anything like that."<br> </span><span class="fs12lh1-5 ff1">"You're a creep ... just admit it," they said.<br> </span><span class="fs12lh1-5 ff1">Law enforcement officials say the case is a cautionary tale. Their advice: Password-protect your wireless router.<br> </span><span class="fs12lh1-5 ff1">Plenty of others would agree. The Sarasota, Fla. man, for example, who got a similar visit from the FBI last year after someone on a boat docked in a marina outside his building used a potato chip can as an antenna to boost his wireless signal and download an astounding 10 million images of child porn, or the North Syracuse, N.Y., man who in December 2009 opened his door to police who'd been following an electronic trail of illegal videos and images. The man's neighbor pleaded guilty April 12.<br> </span><span class="fs12lh1-5 ff1">For two hours that March morning in Buffalo, agents tapped away at the homeowner's desktop computer, eventually taking it with them, along with his and his wife's iPads and iPhones.<br> </span><span class="fs12lh1-5 ff1">Within three days, investigators determined the homeowner had been telling the truth: If someone was downloading child pornography through his wireless signal, it wasn't him. About a week later, agents arrested a 25-year-old neighbor and charged him with distribution of child pornography. The case is pending in federal court.<br> </span><span class="fs12lh1-5 ff1">It's unknown how often unsecured routers have brought legal trouble for subscribers. Besides the criminal investigations, the Internet is full of anecdotal accounts of people who've had to fight accusations of illegally downloading music or movies.<br> </span><span class="fs12lh1-5 ff1">Whether you're guilty or not, "you look like the suspect," said Orin Kerr, a professor at George Washington University Law School, who said that's just one of many reasons to secure home routers.<br> </span><span class="fs12lh1-5 ff1">　<br></span><span class="fs12lh1-5 ff1">Experts say the more savvy hackers can go beyond just connecting to the Internet on the host's dime and monitor Internet activity and steal passwords or other sensitive information.<br> </span><span class="fs12lh1-5 ff1">A study released in February provides a sense of how often computer users rely on the generosity — or technological shortcomings — of their neighbors to gain Internet access.<br> </span><span class="fs12lh1-5 ff1">The poll conducted for the Wi-Fi Alliance, the industry group that promotes wireless technology standards, found that among 1,054 Americans age 18 and older, 32 percent acknowledged trying to access a Wi-Fi network that wasn't theirs. An estimated 201 million households worldwide use Wi-Fi networks, according to the alliance.<br> </span><span class="fs12lh1-5 ff1">The same study, conducted by Wakefield Research, found that 40 percent said they would be more likely to trust someone with their house key than with their Wi-Fi network password.<br> </span><span class="fs12lh1-5 ff1">For some, though, leaving their wireless router open to outside use is a philosophical decision, a way of returning the favor for the times they've hopped on to someone else's network to check e-mail or download directions while away from home .<br> </span><span class="fs12lh1-5 ff1">"I think it's convenient and polite to have an open Wi-Fi network," said Rebecca Jeschke, whose home signal is accessible to anyone within range.<br> </span><span class="fs12lh1-5 ff1">"Public Wi-Fi is for the common good and I'm happy to participate in that — and lots of people are," said Jeschke, a spokeswoman for the Electronic Frontier Foundation, a San Francisco-based nonprofit that takes on cyberspace civil liberties issues.<br> </span><span class="fs12lh1-5 ff1">Experts say wireless routers come with encryption software, but setting it up means a trip to the manual.<br> </span><span class="fs12lh1-5 ff1">The government's Computer Emergency Readiness Team recommends home users make their networks invisible to others by disabling the identifier broadcasting function that allows wireless access points to announce their presence. It also advises users to replace any default network names or passwords, since those are widely known, and to keep an eye on the manufacturer's website for security patches or updates.<br> </span><span class="fs12lh1-5 ff1">People who keep an open wireless router won't necessarily know when someone else is piggybacking on the signal, which usually reaches 300-400 feet, though a slower connection may be a clue.<br> </span><span class="fs12lh1-5 ff1">For the Buffalo homeowner, who didn't want to be identified, the tip-off wasn't nearly as subtle.<br> </span><span class="fs12lh1-5 ff1">It was 6:20 a.m. March 7 when he and his wife were awakened by the sound of someone breaking down their rear door. He threw a robe on and walked to the top of the stairs,<br> </span><span class="fs12lh1-5 ff1">　<br></span><span class="fs12lh1-5 ff1">looking down to see seven armed people with jackets bearing the initials I-C-E, which he didn't immediately know stood for Immigration and Customs Enforcement.<br> </span><span class="fs12lh1-5 ff1">"They are screaming at him, 'Get down! Get down on the ground!' He's saying, 'Who are you? Who are you?'" Covert said.<br> </span><span class="fs12lh1-5 ff1">"One of the agents runs up and basically throws him down the stairs, and he's got the cuts and bruises to show for it," said Covert, who said the homeowner plans no lawsuit. When he was allowed to get up, agents escorted him and watched as he used the bathroom and dressed.<br> </span><span class="fs12lh1-5 ff1">The homeowner later got an apology from U.S. Attorney William Hochul and Immigration and Customs Enforcement Special Agent in Charge Lev Kubiak.<br> </span><span class="fs12lh1-5 ff1">But this wasn't a case of officers rushing into the wrong house. Court filings show exactly what led them there and why.<br> </span><span class="fs12lh1-5 ff1">On Feb. 11, an investigator with the Department of Homeland Security, which oversees cybersecurity enforcement, signed in to a peer-to-peer file sharing program from his office. After connecting with someone by the name of "Doldrum," the agent browsed through his shared files for videos and images and found images and videos depicting children engaged in sexual acts.<br> </span><span class="fs12lh1-5 ff1">The agent identified the IP address, or unique identification number, of the router, then got the service provider to identify the subscriber.<br> </span><span class="fs12lh1-5 ff1">Investigators could have taken an extra step before going inside the house and used a laptop or other device outside the home to see whether there was an unsecured signal. That alone wouldn't have exonerated the homeowner, but it would have raised the possibility that someone else was responsible for the downloads.<br> </span><span class="fs12lh1-5 ff1">After a search of his devices proved the homeowner's innocence, investigators went back to the peer-to-peer software and looked at logs that showed what other IP addresses Doldrum had connected from. Two were associated with the State University of New York at Buffalo and accessed using a secure token that UB said was assigned to a student living in an apartment adjacent to the homeowner. Agents arrested John Luchetti March 17. He has pleaded not guilty to distribution of child pornography.<br> </span><span class="fs12lh1-5 ff1">Luchetti is not charged with using his neighbor's Wi-Fi without permission. Whether it was illegal is up for debate.<br> </span><span class="fs12lh1-5 ff1">"The question," said Kerr, "is whether it's unauthorized access and so you have to say, 'Is an open wireless point implicitly authorizing users or not?'<br> </span><span class="fs12lh1-5 ff1">"We don't know," Kerr said. "The law prohibits unauthorized access and it's just not clear what's authorized with an open unsecured wireless."<br> </span><span class="fs12lh1-5 ff1">　<br></span><span class="fs12lh1-5 ff1">In Germany, the country's top criminal court ruled last year that Internet users must secure their wireless connections to prevent others from illegally downloading data. The court said Internet users could be fined up to $126 if a third party takes advantage of their unprotected line, though it stopped short of holding the users responsible for illegal content downloaded by the third party.<br> </span><span class="fs12lh1-5 ff1">The ruling came after a musician sued an Internet user whose wireless connection was used to download a song, which was then offered on an online file sharing network. The user was on vacation when the song was downloaded.</span></div><span class="fs12lh1-5 ff1">BUFFALO, N.Y. – Lying on his family room floor with assault weapons trained on him, shouts of "pedophile!" and "pornographer!" stinging like his fresh cuts and bruises, the Buffalo homeowner didn't need long to figure out the reason for the early morning wake-up call from a swarm of federal agents.<br> </span><span class="fs12lh1-5 ff1">That new wireless router. He'd gotten fed up trying to set a password. Someone must have used his Internet connection, he thought.<br> </span><span class="fs12lh1-5 ff1">"We know who you are! You downloaded thousands of images at 11:30 last night," the man's lawyer, Barry Covert, recounted the agents saying. They referred to a screen name, "Doldrum."<br> </span><span class="fs12lh1-5 ff1">"No, I didn't," he insisted. "Somebody else could have but I didn't do anything like that."<br> </span><span class="fs12lh1-5 ff1">"You're a creep ... just admit it," they said.<br> </span><span class="fs12lh1-5 ff1">Law enforcement officials say the case is a cautionary tale. Their advice: Password-protect your wireless router.<br> </span><span class="fs12lh1-5 ff1">Plenty of others would agree. The Sarasota, Fla. man, for example, who got a similar visit from the FBI last year after someone on a boat docked in a marina outside his building used a potato chip can as an antenna to boost his wireless signal and download an astounding 10 million images of child porn, or the North Syracuse, N.Y., man who in December 2009 opened his door to police who'd been following an electronic trail of illegal videos and images. The man's neighbor pleaded guilty April 12.<br> </span><span class="fs12lh1-5 ff1">For two hours that March morning in Buffalo, agents tapped away at the homeowner's desktop computer, eventually taking it with them, along with his and his wife's iPads and iPhones.<br> </span><span class="fs12lh1-5 ff1">Within three days, investigators determined the homeowner had been telling the truth: If someone was downloading child pornography through his wireless signal, it wasn't him. About a week later, agents arrested a 25-year-old neighbor and charged him with distribution of child pornography. The case is pending in federal court.<br> </span><span class="fs12lh1-5 ff1">It's unknown how often unsecured routers have brought legal trouble for subscribers. Besides the criminal investigations, the Internet is full of anecdotal accounts of people who've had to fight accusations of illegally downloading music or movies.<br> </span><span class="fs12lh1-5 ff1">Whether you're guilty or not, "you look like the suspect," said Orin Kerr, a professor at George Washington University Law School, who said that's just one of many reasons to secure home routers.<br> </span><span class="fs12lh1-5 ff1">　<br></span><span class="fs12lh1-5 ff1">Experts say the more savvy hackers can go beyond just connecting to the Internet on the host's dime and monitor Internet activity and steal passwords or other sensitive information.<br> </span><span class="fs12lh1-5 ff1">A study released in February provides a sense of how often computer users rely on the generosity — or technological shortcomings — of their neighbors to gain Internet access.<br> </span><span class="fs12lh1-5 ff1">The poll conducted for the Wi-Fi Alliance, the industry group that promotes wireless technology standards, found that among 1,054 Americans age 18 and older, 32 percent acknowledged trying to access a Wi-Fi network that wasn't theirs. An estimated 201 million households worldwide use Wi-Fi networks, according to the alliance.<br> </span><span class="fs12lh1-5 ff1">The same study, conducted by Wakefield Research, found that 40 percent said they would be more likely to trust someone with their house key than with their Wi-Fi network password.<br> </span><span class="fs12lh1-5 ff1">For some, though, leaving their wireless router open to outside use is a philosophical decision, a way of returning the favor for the times they've hopped on to someone else's network to check e-mail or download directions while away from home .<br> </span><span class="fs12lh1-5 ff1">"I think it's convenient and polite to have an open Wi-Fi network," said Rebecca Jeschke, whose home signal is accessible to anyone within range.<br> </span><span class="fs12lh1-5 ff1">"Public Wi-Fi is for the common good and I'm happy to participate in that — and lots of people are," said Jeschke, a spokeswoman for the Electronic Frontier Foundation, a San Francisco-based nonprofit that takes on cyberspace civil liberties issues.<br> </span><span class="fs12lh1-5 ff1">Experts say wireless routers come with encryption software, but setting it up means a trip to the manual.<br> </span><span class="fs12lh1-5 ff1">The government's Computer Emergency Readiness Team recommends home users make their networks invisible to others by disabling the identifier broadcasting function that allows wireless access points to announce their presence. It also advises users to replace any default network names or passwords, since those are widely known, and to keep an eye on the manufacturer's website for security patches or updates.<br> </span><span class="fs12lh1-5 ff1">People who keep an open wireless router won't necessarily know when someone else is piggybacking on the signal, which usually reaches 300-400 feet, though a slower connection may be a clue.<br> </span><span class="fs12lh1-5 ff1">For the Buffalo homeowner, who didn't want to be identified, the tip-off wasn't nearly as subtle.<br> </span><span class="fs12lh1-5 ff1">It was 6:20 a.m. March 7 when he and his wife were awakened by the sound of someone breaking down their rear door. He threw a robe on and walked to the top of the stairs,<br> </span><span class="fs12lh1-5 ff1">　<br></span><span class="fs12lh1-5 ff1">looking down to see seven armed people with jackets bearing the initials I-C-E, which he didn't immediately know stood for Immigration and Customs Enforcement.<br> </span><span class="fs12lh1-5 ff1">"They are screaming at him, 'Get down! Get down on the ground!' He's saying, 'Who are you? Who are you?'" Covert said.<br> </span><span class="fs12lh1-5 ff1">"One of the agents runs up and basically throws him down the stairs, and he's got the cuts and bruises to show for it," said Covert, who said the homeowner plans no lawsuit. When he was allowed to get up, agents escorted him and watched as he used the bathroom and dressed.<br> </span><span class="fs12lh1-5 ff1">The homeowner later got an apology from U.S. Attorney William Hochul and Immigration and Customs Enforcement Special Agent in Charge Lev Kubiak.<br> </span><span class="fs12lh1-5 ff1">But this wasn't a case of officers rushing into the wrong house. Court filings show exactly what led them there and why.<br> </span><span class="fs12lh1-5 ff1">On Feb. 11, an investigator with the Department of Homeland Security, which oversees cybersecurity enforcement, signed in to a peer-to-peer file sharing program from his office. After connecting with someone by the name of "Doldrum," the agent browsed through his shared files for videos and images and found images and videos depicting children engaged in sexual acts.<br> </span><span class="fs12lh1-5 ff1">The agent identified the IP address, or unique identification number, of the router, then got the service provider to identify the subscriber.<br> </span><span class="fs12lh1-5 ff1">Investigators could have taken an extra step before going inside the house and used a laptop or other device outside the home to see whether there was an unsecured signal. That alone wouldn't have exonerated the homeowner, but it would have raised the possibility that someone else was responsible for the downloads.<br> </span><span class="fs12lh1-5 ff1">After a search of his devices proved the homeowner's innocence, investigators went back to the peer-to-peer software and looked at logs that showed what other IP addresses Doldrum had connected from. Two were associated with the State University of New York at Buffalo and accessed using a secure token that UB said was assigned to a student living in an apartment adjacent to the homeowner. Agents arrested John Luchetti March 17. He has pleaded not guilty to distribution of child pornography.<br> </span><span class="fs12lh1-5 ff1">Luchetti is not charged with using his neighbor's Wi-Fi without permission. Whether it was illegal is up for debate.<br> </span><span class="fs12lh1-5 ff1">"The question," said Kerr, "is whether it's unauthorized access and so you have to say, 'Is an open wireless point implicitly authorizing users or not?'<br> </span><span class="fs12lh1-5 ff1">"We don't know," Kerr said. "The law prohibits unauthorized access and it's just not clear what's authorized with an open unsecured wireless."<br> </span><span class="fs12lh1-5 ff1">　<br></span><span class="fs12lh1-5 ff1">In Germany, the country's top criminal court ruled last year that Internet users must secure their wireless connections to prevent others from illegally downloading data. The court said Internet users could be fined up to $126 if a third party takes advantage of their unprotected line, though it stopped short of holding the users responsible for illegal content downloaded by the third party.<br> </span><span class="fs12lh1-5 ff1">The ruling came after a musician sued an Internet user whose wireless connection was used to download a song, which was then offered on an online file sharing network. The user was on vacation when the song was downloaded.</span></div><p></p></div>]]></description>
			<pubDate>Thu, 17 Jul 2014 01:36:00 GMT</pubDate>
			<link>https://litecom.net/blog/?wireless-security-article--1</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/0w7vbqt1</guid>
		</item>
		<item>
			<title><![CDATA[Hosted VoIP]]></title>
			<author><![CDATA[]]></author>
			<category domain="https://litecom.net/blog/index.php?category=VoIP"><![CDATA[VoIP]]></category>
			<category>imblog</category>
			<description><![CDATA[<div id="imBlogPost_35d85lct"><p class="imTALeft"></p><div><span class="fs14lh1-5">Hosted VoIP.<br></span><div><span class="fs14lh1-5"> &nbsp;To Host or not to Host, that is the question.<br>There is great discussion and conflict in opinion on using a hosted VoIP, or on premise VoIP solution.<br> &nbsp;Hosted offers the advantage of not maintaining on premise PBX equipment. Since there are many on-site PBX's to choose from, it is difficult to say for certain which solution would be more advantages’. Some on site IP PBX’s offer quick investment turnaround.<br> &nbsp;At the end of the day, it is important to have a VoIP expert to consult with, and examine the pros and cons of all the options in order to make the best decision.</span></div></div><p></p></div>]]></description>
			<pubDate>Thu, 17 Jul 2014 00:06:00 GMT</pubDate>
			<link>https://litecom.net/blog/?hosted-voip</link>
			<guid isPermaLink="false">https://litecom.net/blog/rss/35d85lct</guid>
		</item>
	</channel>
</rss>