Skip to main content
For Cybersecurity & IT Solutions Call (310) 955-1600
  • Contact Us
search
  • About Us
    • Message from the President

      Shamrock exists as a trusted ally to enterprise IT leaders responsible for making the most difficult and sensitive decisions related to technology procurement.

      We provide comprehensive and objective analysis at no cost to our customers, helping you make the right decisions on any product from any provider at the guaranteed best price.

      Paul Cooney
      President


      Contact me for a FREE on-site walk through.

      Schedule Now
    • Our Company
    • In The News
      News Press Release

      CIO Review Awarded Shamrock as “20 Most Promising AWS Solution Providers” for 2019

      We are proud to announce that Shamrock has been recognized by CIO Review at one of the “20 Most Promising AWS Solution Providers” for 2019! Check out the article on how our AWS solutions are changing the game for IT decision makers around the globe.
      News Press Release
      Shamrock & Google Come Together to Talk Cloud Computing
      News Press Release
      Insight Success: Shamrock Consulting Group: The 10 Most Innovative Telecom Solution Providers 2018
  • Solutions
      • Cloud Services
        • cdc-wide-v2Cloud Direct Connect

          Connect From Any Location To Any Cloud.

          AWS Direct Connect | Azure ExpressRoute | Google Cloud Interconnect | IBM Cloud Direct Link

          Shamrock can reduce your cloud egress costs by up to 80%

          Learn More
        • cloud-migration-v2Cloud Migration

          Proven leader with successful hands-on cloud deployments, systematically analyzing every aspect of your cloud infrastructure to avoid wasted dollars.

          34% Average Savings on Cloud Services through Shamrock

          Learn More
        • cloud-security-1000×500(2)Cloud Security

          Whether your company is premise-based, in a private cloud, hybrid cloud, or multi-cloud, Shamrock has you covered. We will help you secure and easily monitor your corporate environment in real-time.

          An industry leader in corporate security

          Learn More
        • cloud-cost-optCloud Cost Management

          Shamrock has carefully vetted the top performing tools for public and private cloud orchestration and cost management to service deployments of any size, on any budget at guaranteed best rates.

          Shamrock can reduce your public cloud spend by 40%

          Learn More
        • Platinum Public Cloud Services
          • aws-plat-v2

            Whether you’re looking to migrate to AWS, better manage your current AWS environment, or expand your capabilities within AWS, Shamrock can help.

            We’re top rated AWS consultants for a reason – because we’re a team of vendor-neutral, award-winning cloud experts who always act in the best interests of our clients, and we always guarantee the best price on AWS products and services.

            Learn More
          • azure-plat

            We’ll help you maximize your Azure experience and take your business to the next level by designing, deploying and managing scalable infrastructure and application-based solutions. We’ll even facilitate your migration from your on-prem or environment or from another cloud provider to Azure, in whatever capacity you choose.

            Shamrock is a Certified MS Azure Partner, offering expert consulting services at the guaranteed best price.

            Learn More
          • gcp-plat

            Google’s Partner Network is one of the most prestigious in the industry, and Shamrock is honored to be a part of it. As a Google Partner, Shamrock is your go-to resource for support in GCP. We provide free 24/7 US-based support, migration support, scalable solutions, cloud cost management and more within GCP, all for the guaranteed best price.

            Shamrock is the market leader in GCP cost reduction, GCP migration services, GCP Interconnect direct connects and much more.

            Learn More
      • Data Center
        • cloud-security-1000×500(2)Cloud Security

          Whether your company is premise-based, in a private cloud, hybrid cloud, or multi-cloud, Shamrock has you covered. We’ll help you secure and easily monitor your environment in real-time to ensure proactive protection of your corporate IT environment. Join our growing list of Fortune 500, Fortune 100 and Fortune 50 customers and see why Shamrock is an industry leader in corporate security.

          Join our growing list of Fortune 500 and see why Shamrock is an industry leader in corporate security.

          Learn More
        • data-center-colocation-v2(1)Colocation

          We’ve been recognized as an industry leader in data center sourcing and procurement on a global scale. We represent every major data center operator both domestically and globally, so no matter the size, scope or area of your needs, we’ve got you covered. With over 1,200 major networks, enterprises, and business partners available for interconnection and traffic exchange via direct cross connects, peering and Ethernet services

          We Sell Data Center Space!

          Learn More
        • cdc-wide-v2Cloud Direct Connect

          Shamrock is an industry leader in provisioning cloud direct connects from any business or data center location, anywhere in the world, at any speed (10 Mbps to 100Gbps).

          We’re also the exclusive solution provider for 100G cloud direct connects into Google Cloud Interconnect and AWS Direct Connect.

          Join Out 100GIG Pilot Program.

          Learn More
      • Telecom Solutions
        • tem-squareTelecom Expense Management (TEM)

          Our portfolio of services includes business process outsourcing (BPO), telecommunication audit, procurement advisory, and wireless expense management. We strive to produce sustained results for your organization.

          Learn More
        • ent-mob-squareEnterprise Mobility Management

          Shamrock’s mobile cost management experts can help you drastically reduce your enterprise mobility costs without any provider or contract changes. Our technology uses patented algorithms and machine learning. The result: instant and tangible savings!

          Learn More
        • art1-new-1-smallVoice Services

          Shamrock Consulting provides Long Distance Services with cost-effective in-state, state-to-state, international and toll-free calling for businesses. International or Domestic Toll-Free Numbers, Conferencing Services, powerful cost-management options.

          Learn More
        • ucaas-thumb-optUCaaS / Hosted PBX

          As industry-leading UCaaS consultants, Shamrock has negotiated direct partnerships with every major UCaaS provider to ensure that our clients receive the best possible solution at the best possible price. Guaranteed.

          Learn More
        • 3-new-smallAnalog Line Consolidation

          Dynamically manage traffic pattern changes and get high-quality, reliable voice services that leverage your existing PBX investment. Pbx Service Providers, SIP Service, Pbx Pricing, Cloud Pbx and more.

          34% Average Cost Savings with Shamrock

          Learn More
      • WAN Solutions
        • 2-new-1Broadband Aggregation

          The need to future proof your network has created an unprecedented demand for fiber to the premise. Dark Fiber, Fiber Ethernet, DS3, OC-x, Fixed Wireless (Microwave, lazer, WIMAX), Ethernet over Copper (EOC), T1, NxT1, Cable, DS, Shamrock Consulting Group has all of your options in one place.

          Let's Start With Understanding Your Internet Access Options!

          Learn More
        • art2-1-new-smallInternet Access

          The need to future proof your network has created an unprecedented demand for fiber to the premise. Dark Fiber, Fiber Ethernet, DS3, OC-x, Fixed Wireless (Microwave, lazer, WIMAX), Ethernet over Copper (EOC), T1, NxT1, Cable, DS, Shamrock Consulting Group has all of your options in one place.

          Let's Start With Understanding Your Internet Access Options!

          Learn More
        • art8-new-smallPrivate WAN (MPLS / VPLS)

          Global enterprises, financial institutions, the largest networks and the Internet’s foremost content companies trust us with what matters most to them—their information assets. Shamrock Consulting Group can design wide area networks for any size, any budget, anywhere.

          Let's Start With Understanding Your WAN Objectives!

          Learn More
        • art3-new-smallDark Fiber

          We partner directly with every major Dark Fiber providers in the U.S., Europe and Asia-Pacific. We also work with cities and municipalities such as Los Angeles County, Orange County, the San Francisco Bay Area, New York City and elsewhere to find you the best possible solution at the guaranteed best price.

          Looking for fiber providers in your area?

          Learn More
        • art7-new-smallSD-WAN

          As top-rated SD WAN consultants who partner directly with every leading SD WAN provider in the industry, Shamrock is committed to helping you make well-informed procurement decisions at the guaranteed best price. We offer a free consultation to identify the best solution for your needs and budget.

          Considering an SD-WAN solution for your company?

          Learn More
      • Cybersecurity
        • crowd-strikeCrowdstrike EDR/MDR

          As a CrowdStrike partner, the Shamrock team as a whole are big fans of the company’s cloud native endpoint protection platform. But don’t take our word for it – we’ve had hundreds of customers using CrowdStrike tell us how much they love the platform, and many of them have said that they have no idea how they ever lived without it.

          Licensing discounts of up to 50 percent below market rates.

          Learn More
        • penntesting-v2Penetration Testing

          We’ve formed deep partnerships with the most trustworthy cybersecurity vendors in the industry, and we guarantee the best price from every single one of them. Black, White & Gray Box Testing, Cloud Pentesting, Mobile & Web App Pentesting, Wireless Pentesting, Physical Pentesting, Client-Side Pentesting. In addition to pentesting, we can also help you out with next-generation firewalls, endpoint protection and corporate email security.
          Schedule Your Free Pentest Analysis.

          Learn More
        • vulnerability-testingVulnerability Management

          We take a look at some great security solutions that achieve real time visibility into all aspects of a corporate network, even reaching the most remotely deployed endpoints. If you’re interested (and you probably should be), Shamrock Consulting Group can secure these cutting-edge tools for you at the best prices.

          We can offer the best prices on CrowdStrike products and can also provide a free security assessment.

          Learn More
        • ngfwNGFW & Software Defined Perimeter

          How can companies be both agile and secure in these unprecedented times? For help with empowering your WFH teams with the tools and processes they need, speak to a Shamrock consultant today.

          Our strategic partners are comprised of the very best in the industry from a security standpoint (Trustwave, AlertLogic, CrowdStrike, Fortinet, PaloAlto, Carbon Black, etc.).

          Learn More
        • cloud-security-smallCloud Security

          Whether your company is premise-based, in a private cloud, hybrid cloud, or multi-cloud, Shamrock has you covered. We’ll help you secure and easily monitor your environment in real-time to ensure proactive protection of your corporate IT environment.

          Join our growing list of Fortune 500 and see why Shamrock is an industry leader in corporate security.

          Learn More
  • RFP Services
  • Industries
    • biotech-telecom-consulting-v2Biotech

      Safeguard Proprietary, Mission Critical Data Whether its R&D for a world changing innovation or straightforward emails to accounting, Shamrock provides a comprehensive suite of security services – including Managed Firewall, Intrusion Detection/Prevention, and Vulnerability Scanning – to ensure that your organization’s data is safeguarded and kept out of the wrong hands.

      Let's Start With Understanding Your Biotech Telecom Objectives!

      Learn More
    • real-estate-construction-cloud-solutionsConstruction & Development

      Whether you are looking to increase network uptime, reduce operational expenses, or build a next generation global development company, Shamrock Consulting Group has turnkey solutions tailored to the needs of the Construction and Development industry at guaranteed best rates.

      Let's Start With Understanding Your Telecom Objectives for Construction & Development sites!

      Learn More
    • finance-cloud-solutionsFinance

      Shamrock Consulting Group’s Financial Services practice offers customers robust custom architected network, cloud, data center, and unified communications solutions that provide the security, compliance, and uptime their organizations require to function on a day-to-day basis.

      Let's Start With Understanding Your Financial Organization's Telecom Objectives!

      Learn More
    • healthcare-cloud-solutionsHealthcare

      Shamrock has cross-disciplinary knowledge of healthcare-specific IT apps. Shamrock has extensive rural network design and build experience. In addition to 100+ partners, Shamrock has experience, connections and industry tools to identify, design to, spec, procure and project manage complex multi-vendor deployments. Healthcare institutions, financial institutions, the largest networks and the Internet’s foremost content companies trust us with what matters most to them—their information assets.

      Let's Start With Understanding Your Healthcare Telecom Objectives!

      Learn More
    • media-entertainment-cloud-solutionsMedia & Entertainment

      Whether you are looking to increase network uptime, reduce operational expenses, or build a next-generation global studio, Shamrock Consulting Group has turnkey solutions tailored to the needs of the Media and Entertainment industry at guaranteed best rates. Nobody delivers more connectivity solutions to Media and Entertainment companies than Shamrock Consulting Group!

      300+ Media and Entertainment Customers Served!

      Learn More
    • retail-cloud-solutionsRetail / Restaurant

      Shamrock Consulting Group offers its retail customers the best-fit, access technologies at each of their sites to ensure complete coverage and uptime at low costs. We design solutions that provide PCI-compliant security for credit card transactions and support for data communications for key retail applications—including point-of-sale, back-office systems, training, and digital video surveillance.

      Let's Start With Understanding Your Retail Business Operational Objectives!

      Learn More
    • saas-cloud-solutionsSAAS Providers

      Whether you are looking to increase network uptime, reduce operational expenses, or build a next generation global Software as a Service Platform, Shamrock Consulting Group has turnkey solutions tailored to the needs of the SaaS Industry at guaranteed best rates. Low, Mid, and High-density data center options with robust connectivity options to extend service coverage all over the globe.

      Let's Start With Understanding Your SAAS Objectives!

      Learn More
  • Tools
  • Press
  • Contact Us

Cyber Security Threats: Everything you Need to Know About Cybersecurity (Part I)

Cyber Security Threats

What is a Cybersecurity Threat?

Cybersecurity threats can be broadly defined as threats posed by malicious actors, including individuals or organizations, that try to infiltrate a network for unauthorized access. This access can then be used to steal or corrupt data, spy on the organization, and jeopardize the company’s operations in various other ways.

Cybersecurity threats pose a grave threat to individuals, business organizations and public sector organizations alike. Cybersecurity threats can virtually come from anywhere with basic level threats, such as, generic phishing emails, to highly sophisticated and targeted attacks that may use cutting edge technologies, such as AI and ML.

The fallouts from cybersecurity threats may include equipment failure, data loss that can be significant and permanent, electrical blackouts, disruption of essential services and more. Cyber security definition refers to all the defensive tactics and strategies that can be implemented by organizations in order to protect themselves from a range of cyber threats.

Main Types of Cyber Threats

Cyber Security Threat Types are diverse. We have included the most common Types Of Cyber Threat here:

Malware

Malware refers to malicious software that can include a variety of spyware, ransomware, Trojans, viruses and worms. Malware is generally distributed through malicious links and attachments sent through emails and messages.

Clicking on these can result in the installation of dangerous software in the user’s system. Malware can result in a complete hijacking of the user’s system, installation of spyware that silently monitors all traffic and actions on the affected system, holding sensitive data hostage by encrypting the data and demanding ransom or, even complete destruction of the system.

Some systems can also be infiltrated in order to install a backdoor into the network wherein authentication procedures can be bypassed by malicious actors and enable unauthorized remote access for issuing or altering system commands and overall functioning.

Phishing and spear phishing

Phishing attacks can range from mass mailed generic emails to highly sophisticated social engineering attacks that target individuals within a complex corporate hierarchy. Phishing attacks are generally perpetrated through the attackers posing as highly trusted people or businesses known by the victim.

This kind of social engineering attack is generally designed to dupe users into divulging sensitive information, such as, key credentials, sensitive business information, bank account information, Social Security numbers, and financial information including credit card data.

Phishing attacks can also make use of spoofing websites that resemble highly trusted websites almost exactly fooling users into entering their personal information. Attachments sent through Phishing emails can result in the installation of malware that can then be used for remote access of the system, installation of spyware, and more.

Spear phishing, on the other hand, is a more targeted form of Phishing attack that is used to Target more privileged users, such as, financial team members with authorization for significant transactions, system administrators, and C-suite executives. These attacks are fine-tuned to elicit specific responses from the victims and generally involve high-level research into their backgrounds and all available social information.

Phishing attacks can also include smishing, vishing, clone phishing, URL phishing, and evil twin phishing.

Emotet

Emotet is a type of advanced Trojan that can be used as a downloader or dropper of other banking Trojans. The Cybersecurity and Infrastructure Security Agency (CISA) ranks Emotet as one of the costliest and destructive malware currently in function.

Denial of Service (DoS)

A denial of service (DoS) attack disrupts the functioning of a computer or a network by flooding it with false requests. Hackers use denial of service (DoS) attacks to target and overwhelm a system’s processing capabilities. It can even be used as a cover for launching other kinds of cyber attacks.

Man-in-the-middle (MITM) attacks

Man-in-the-middle (MITM) attacks are generally orchestrated through malicious actors inserting themselves in between a two-party transaction in order to ‘eavesdrop’ on the conversation. Once they manage to interrupt the traffic flow, MITM attacks can be used to filter and steal data and return different responses to the end-user. The intent is to gain unauthorized access to sensitive and private business or customer data.

Distributed denial of service (DDoS)

Distributed denial of service (DDoS) attacks an organization’s server by overwhelming it with requests. In this type of attack, requests are generated from many thousands of compromised IPs. DDoS attacks are highly effective in overloading an organization’s servers, resulting in significant performance delays or complete shutdowns. With servers out of reach, the company’s productivity takes a hit as genuine customers are unable to reach them.

Some hackers can even deliberately disable the service in order to launch a secondary and possibly more powerful attack. He would likely two have already come across botnet attacks that are a type of DDoS attack. Botnets typically target millions of systems with malware to take over control and cripple a target system. What makes botnets harder to defend against is that they may be located in different geographic locations and nearly untraceable.

Structured Query Language (SQL) injection

Company databases can often be the target of SQL injection attacks wherein hackers try to gain access to the databases by uploading malicious SQL scripts. If the scripts are successful, the hackers get a degree of administrative control wherein they can view, modify, or delete data stored in the SQL database. Malicious code can be inserted through as simple a strategy as entering it into the target website’s search box.

Domain Name System (DNS) attack

This kind of an attack takes place when hackers try to compromise a network based on the website’s DNS vulnerabilities. DNS attacks can take place in many ways including attackers trying to divert site visitors to malicious pages through DNS hijacking or trying to steal data from compromised systems, commonly referred to as DNS tunneling.

Emerging Cyber Threat Types

Cloud breaches

Nearly all individuals and businesses working today make use of cloud applications in one way or another. This is especially true for companies trying to maintain pre-pandemic levels of productivity through remote work. These companies typically make use of cloud technologies extensively for collaboration and delivery of products and services. With workloads shifting to the cloud, cybercriminals have also followed suit with some targeting the cloud almost exclusively.

The risk is magnified because the cloud is already vulnerable to a variety of security risks including but not limited to cloud misfigurations, incomplete data deletion, and application vulnerabilities.

IoT attacks

IoT has been plagued by security concerns since it’s inception. In order to meet consumer demand, a lot of companies have released IOT devices with minimal or no security features embedded. Since these devices are typically cheap, they often come with no further security features than a basic password that users may or may not be able to configure at their end. Many companies do not update security features once the product has been released. Given the raw data accumulation and processing power IoT devices possess, and the fact that all of them communicate over the Internet – these factors combine to make IoT devices both highly profitable and vulnerable to security threats.

Hackers have started to increasingly target smart home elements, such as smart TVs, voice assistants, connected surveillance equipment and cellphones. Some even target enterprise IoT devices for data espionage or botnet type of attacks. If the attempt is successful, hackers stand to gain access to a treasure trove of lucrative information including access to network, Wi-Fi credentials, financial data, medical records, and password keychains.

Main Targets of Cyber Threats / Most Vulnerable Industries.

Government websites/Military

Government agencies are a lucrative target for hackers as they hold vast amounts of confidential information, including biometric information, Social Security numbers, and more. Combine this with the fact that government servers and databases are infrequently updated and are often rife with vulnerabilities. Needless to say, this poses a serious threat to both the stability of the nation as well as in the seamless conduct of essential public services.

In fact we have seen a slew of high profile Government and military security breaches in the recent past that has led to the cyberattacks being rightly treated as a matter of national security. Government agencies can be targeted by a variety of threat actors including:

  • Foreign nations trying to spy and get access to privileged information
  • Hacktivists motivated by different political ideas who try to access and release classified information or, make a political statement
  • Hackers who can hold Government agencies at ransom by stealing and establishing control over critical information
  • Terrorists looking to access the abundant personal information in federal, state, and local databases

Education

Educational institutions have become a highly popular target for cyber criminals as they form lucrative sources of information for a variety of highly valuable data. It doesn’t hurt that they are also highly prone to vulnerabilities in cyber defense mechanisms. Public and private schools alike have come under the fire of rampant ransomware attacks. Educational institutions are highly valued by cyber criminals because:

  • They are typically data-rich and possess valuable intellectual property from research
  • Student and employee personal information are not well-guarded
  • They possess lucrative computer processing power.
  • High degree of susceptibility to social engineering and poor password hygiene

Healthcare

Healthcare organizations possess one of the most valuable types of data available to hackers and are constantly on the radar for Cyber Attacks On Healthcare. Also with the kind of workload that healthcare organizations had to deal with in the recent past, it’s nearly impossible for them to recruit and retain the requisite technical talent in-house to maintain proper cyber defenses. Many healthcare organizations are continuing to operate with outdated operating systems that run on legacy hardware and software. This makes them particularly vulnerable to attacks like ransomware.

Finance / Banks

Financial data is also a prime target for cyber criminals. Cyber Security Threats In Banking Sector are quite common as banks are a treasure trove for not just financial data but also, personal information. Although financial institutions are much more active in securing their defense posture against potential cyber threats, they continue to be successfully infiltrated every year.

The FDIC has now made penetration testing mandatory for financial institution compliance. This is because it is critical for banks, credit unions, and other financial institutions to ensure the privacy and security of customer information to maintain customer trust. The financial sector is also prone to a much higher incidence of insider threats.

Small and Medium-Sized Businesses

well cyber attack five mostly highlighted win the target big ticket institutions, such as, Microsoft, Netflix, and financial institutions – the major brunt of cyber attacks is still borne out by small to medium businesses. Recent data suggests that nearly 60 percent of SMBs are likely to go out of business within 6 months of a major breach. With the pandemic making life difficult for most SMBs with many undergoing hurried digital transformation (nearly overnight) – this has left the sector wide open to an array of security vulnerabilities.

Energy/Utilities

Energy and utilities sectors are highly vulnerable to cyberattacks as their impact can literally cripple all esse can you gontial services in a region. If the intention is to create panic and confusion, hackers are well placed to do so by taking over the network of energy/ utility companies to cause widespread power outages that can seriously jeopardize critical security and defense infrastructure, potentially endangering many lives.

A relevant example of Cyber Attack On Energy Sector can be found in the recent US Colonial Pipeline attack. The problem becomes further complicated when it comes to hackers asserting partial or complete access to key facilities, such as nuclear facilities, power grids, and more. Although these sectors are highly regulated and face tough compliance laws (NERC), they are still a prominent target for hacktivism and cyberterrorism.

Most Common Sources of Cyber Threats

Criminal Groups

Organized criminal groups often utilize a variety of cyber crime techniques including spam, phishing, and spyware/malware for monetary gain through criminal activities such as data theft, identity fraud, and ransomware.

Hackers

Hackers commit illicit cyber activities, both for the sake of proving their prowess at breaking through sophisticated defense mechanisms and also for monetary, political and even personal advantages.

Healthcare

Anyone within the company network can act as an insider for facilitating cyberattacks. These can include anyone from disgruntled present or former employees, to contractors, or any service personnel within the network. Companies are even at risk from poorly trained employees who may unintentionally divulge privileged information.

Corporate Spies

Industrial espionage has become a formidable threat to businesses as they can hire or develop hacker talent to spy on both public and private entities. They can also leverage this talent for high-value monetary or trade secret theft or even destruction of key competitor data assets or infrastructure as their goals are motivated primarily by profit. They could even try to gain access to sensitive data in order to hold the company at ransom by threatening public exposure or sale of that data.

Nation States

Sources Of Cyber Threat Intelligence shows us that Individual nation states can also pose a significant threat to US interests. The threats can range from espionage to propaganda or even serious attacks that can involve lives lost and infrastructure meltdowns. Classified networks or critical infrastructures are not easy to penetrate and require substantial development of attack capabilities that government-sponsored programs possess.

Terrorist Groups

Terrorists can use cyberattacks to destroy, gain access to, or exploit critical government infrastructure. Their motives can vary from compromising national security, military equipment, or causing significant disruptions in the economy, and more serious attacks against civilian or military populations with lives lost.

While traditional terrorists lack the knowhow to coordinate high level cyberattacks, their ranks are increasingly infused with generations more conversant with technology and its capabilities. As years pass, we can expect to see more and more terrorist attacks being carried out through cyber terrorism.

Hacktivists

Hacktivists are politically active hackers that can include individuals and groups with agendas that run contrary to U.S. interests. They typically carry out isolated but damaging attacks to make a statement, achieve notoriety, and get their voices heard. These attacks are more inclined towards propaganda than loss of lives or damage to critical infrastructures.

Ben Ferguson

Ben Ferguson is the Vice President and Senior Network Architect for Shamrock Consulting Group, an industry leader in digital transformation solutions. Since his departure from Biochemical research in 2004, Ben has built core competencies around cloud direct connects and cloud cost reduction, enterprise wide area network architecture, high density data center deployments, cybersecurity and Voice over IP telephony. Ben has designed hundreds of complex networks for some of the largest companies in the world and he’s helped Shamrock become a top partner of the 3 largest public cloud platforms for AWS, Azure and GCP consulting. When he takes the occasional break from designing networks, he enjoys surfing, golf, working out, trying new restaurants and spending time with his wife, Linsey, his son, Weston and his dog, Hamilton.

best-price-guarantee-tick
Learn About Our Best Price Guarantee