Category Archives: Uncategorized

Cybersecurity Tips and Tricks for Working from Home

The month of October is considered National Cybersecurity Awareness Month, and REDCOM believes it is vitally important to raise awareness about the importance of cybersecurity, now more than ever.

The ease of being able to connect to work at any time day or night from home, and have everything you need in your living room office poses the question, is my network safe? As part of Cybersecurity Awareness Month, here are some top tips to make sure you and your network are staying protected. cybersecurity tips

1. Does your home network have a firewall, anti-virus, and password protection? Make sure to turn it on, and change your password to something no one will guess. Get in the habit of running an anti-virus program weekly for your PC and mobile device.

2. Are you using a VPN to connect in to work? Surfing the web is most safe when you are behind a VPN. Think of it as a safety bubble for your Internet traffic. This should be done at the very least if you are accessing any documents or websites related to work.

3. Where are those important documents going? If you are using a home network to print or save documents to, be sure you are keeping them in a safe place. (Under your cup of coffee is not preferred, but better than near your child’s homework!)

4. Can you separate your duties? Using a mobile device is convenient for many reasons. Using your personal computer to access the corporate network too is easy, but try not to mix personal and business data. Use a VPN when you can, but it’s even better to use a remote desktop. If you are using personal devices for company work, make sure you have a password set up, that you have separate folders for the two types of data, and if you need to send documents through email providers such as Gmail and Yahoo, try sending them encrypted so only the people you want to receive them will.

5. What’s going on with the network? We all take for granted the security and protection of our corporate network. There are many great articles and videos online, that can walk you through simple tasks for making your home network secure as well. Three easy tips are to check your router for a password and the latest updates, do the same for your Wi-Fi, change the name of both and hide them from onlookers. cybersecurity from home

6. If it doesn’t feel safe it probably isn’t. Remember, YOU are the most important asset to the company. You have the power to prevent cybercrimes. If you feel that a link looks suspicious, a website is NSFW, or you have never seen a download like what you are going to install; use your best judgment, it is usually right!

For many of us, remote work is completely new. Just know, there are many resources out there that can help you with questions to staying safe and secure while working from home. There is an entire workforce within your reach who are quite familiar with teleworking, so if you are unsure just ask someone! Work information isn’t the only reason why quick techniques in security is important. The same rules apply to submitting banking information, entering personal data, and protecting items you feel are valuable such as your personal photos and mobile device data. With these easy tips to remember, you can stay safe no matter what you do on the network.

REDCOM Named Democrat and Chronicle Top Workplace Winner

REDCOM has recently been awarded 1st place by the Democrat & Chronicle in the Medium Business Category. In the article written by the D&C, REDCOM’s Dinah Weisberg is featured, where she shares a bit of her story about working her way up the ranks at REDCOM to eventually become CEO in 2017. She also talks about how REDCOM’s small team has managed to do big things, and how our focus on employee health and happiness is demonstrated through the loyalty of our people, and the quality of work that we do.

“We owe our ranking as a top workplace to our great employees who work hard every day,” remarked Weisberg. “Our people are tirelessly dedicated to our mission of enabling the most important conversations in the world – without that, we wouldn’t be where we are today.”

 

Read the full D&C Article

REDCOM’s Response to COVID-19

REDCOM has taken appropriate action amid ongoing health concerns related to COVID-19. To ensure the safety of our employees, many of our team members are working from home. Those that are still working in our headquarters will be practicing careful social distancing.

Of course, we are committed to supporting our customers with the quality and responsiveness you’ve come to expect from REDCOM. Though some of us may be working remotely, our customer support team continues to be available 24/7 to help our customers.

As always, you can reach us at +1.585.924.7550. Emergency after-hours support is also available at +1.585.262.3659.

What to expect if you visit REDCOM during COVID-19

If you plan to visit REDCOM’s offices during the COVID-19 pandemic, please keep the following in mind:

  • Practice Social Distancing measures by staying at least six feet apart
  • Wash your hands and use sanitizer. REDCOM has multiple sanitization stations set up, so please take advantage of them.
  • Wear a face mask at all times while inside the building.
  • Get your temperature taken at the entrance. A REDCOM employee will take your temperature with a no-contact forehead thermometer when you arrive. Anyone with a heightened temperature will be denied access to REDCOM.
  • Self monitor for signs and symptoms of COVID-19. If you have any of these symptoms, we ask that you do NOT come into the office:
    • Fever
    • Cough
    • Shortness of breath
    • Loss of smell
    • Loss of taste
    • Trouble breathing
    • Persistent pain or pressure in the chest
    • New confusion or inability to rouse from sleep
    • Blueish lips or face

We will continue to adapt our protocols and communicate as the situation develops.

We wish you good health and safety during these uncertain times.

Co-Op Feature with Conor Ahern

REDCOM routinely has co-op and internship opportunities available for college students that want to earn real-world experience at a technology company. Our engineering department finds it particularly important to bring these young engineers into the mix for their new perspectives and ideas. At REDCOM, co-op students collaborate directly with our product development teams and are often involved in truly meaningful projects.

Conor Ahern, a Computer Science Major at the Rochester Institute of Technology and co-op on REDCOM’s Secure Client product team, started as an intern and is staying on the team through the summer.

Immediately upon joining the team as an intern, Conor was welcomed as a valued part of the organization, and was able to make real contributions from the beginning, “I’ve had a great experience as a co-op for REDCOM. On only my second or third day, they had already given me things to do, like fixing bugs and helping add features,” Conor remarked.

Initially interested in looking for co-op opportunities at larger tech companies, Conor found REDCOM, and he’s ultimately grateful that he did. “Starting at a small company like REDCOM allowed me to get working right away and learn so much more than I would have at a large company.” He also mentioned how REDCOM’s tightly-knit team made his experience much more fulfilling, “One of the biggest takeaways from my experience is learning how to decide on product decisions with the team, and how to deliberate, discuss, and compromise. No class in school can teach you how to work with a real team, with one end goal in mind, which is making the best product possible.”

REDCOM’s Vice President of Engineering, Jeff Smith, mentions the important role co-ops play within the organization. “These students are smart and eager to learn and contribute – we are learning from them, and they bring in fresh eyes and new ideas,” he remarks. “As Conor can attest to, you’re put to work right away alongside the full-time employees when starting as a co-op at REDCOM. We want to make them full members of the team as quickly as possible with assignments that are integral to the success of the project they are working on. When we are recruiting, I like to tell students that if you came into a team meeting halfway through a co-op assignment, you often can’t tell who’s a co-op and who’s a full-time employee.”

Allan Bennett, Conor’s supervisor, appreciates the contributions of young co-ops like Conor. “They immediately contribute to our Android, iOS, and Windows clients by analyzing code and fixing defects. They participate in daily standups, planning and estimation meetings and demonstrate their work in sprint reviews. From the day they report, co-ops become full and equal members of an agile development team.”

Now, working hard on his team’s current project redesigning the Windows Secure Client Interface with REDCOM’s UX Designer Jim, Conor is excited to see this project through to the end. “Being able to work with everyone on such an important project right from the beginning makes you interested in, and really care about seeing that end result.”

REDCOM has had a steady stream of co-ops throughout the years, several who have transitioned into full-time REDCOM employees. Others took their valuable experience at REDCOM and moved on to important roles at major tech companies. If you’re a college student in the IT, software development, web development, engineering, or cybersecurity disciplines and you’re looking for real-world, on-the-job experience, REDCOM would love to talk to you.

How REDCOM Secures the Mission Part 4: Ease of Use

REDCOM takes a holistic, multi-layer approach to security that goes beyond typical measures such as encryption and validation. Take a look at our Secured Communications paper that discusses REDCOM’s stance on overall mission security, which necessitates a strong focus on encryption, resiliency, interoperability, and ease of use. Take a look at the previous parts of the Securing the Mission Series: Technology, Resiliency, and Interoperability.

Ease of Use

At REDCOM, we understand that the less users have to think about technology, the more time they have to accomplish their mission. Warfighters do not have the luxury of time to contact tech support or wait for field service reps to solve IT issues.

REDCOM recognizes the importance of a simple and intuitive user interface that enables the warfighter to “shoot, move, communicate.” The key to a superior user interface is ‘Human-Centered Design’ which puts the user and their specific needs at the center of every interface.

Using this design philosophy, every choice we make as we develop our software requires us to investigate and open up the lines of communication between our team of designers, engineers, and testers. REDCOM actually conducts one-on-one interviews with our end users to seek their input about ways to improve our interfaces and make their lives easier.

REDCOM solutions are:

  • Extremely easy to learn. Specialized certifications are not required to get up and running with REDCOM
    products. Users can learn to configure and operate our hardware and software with very little training.
  • Built for the warfighter. Our software’s web-based interface is easy to navigate, highly customizable, and quick
    to set up. This eliminates the armed forces’ requirement for industry field service representatives.

 

Want to know more about REDCOM’s stance on securing the mission at the tactical edge? Check out a recent webinar, hosted by REDCOM Government Account Manager, Courtney Stiles.

Watch the Recording

How REDCOM Secures the Mission Part 3: Interoperability

REDCOM takes a holistic, multi-layer approach to security that goes beyond typical measures such as encryption and validation. Take a look at our Secured Communications paper that discusses REDCOM’s stance on overall mission security, which necessitates a strong focus on encryption, resiliency, interoperability, and ease of use. Take a look at part one of our Securing the Mission Series: Technology, and part two: Resiliency.

 

Interoperability

Military and public safety operations are typically joint, requiring the command and control systems of multiple services to work together effectively. System interoperability is a force multiplier for command and control systems. In these situations, commanders constantly consider how technology might affect the unit’s ability to communicate within their jurisdiction, with neighboring agencies, and with federal partners.

 

REDCOM solutions align with the ongoing modernization efforts of global military and defense forces that demand interoperability with both legacy and emerging technologies. REDCOM solutions are:

 

  • Interoperable with coalition forces. The lack of a single coalition network or standard has been a longtime challenge. Each environment often has different requirements, baselines, and standards to suit each partner nation’s various demands, missions, and capabilities. REDCOM technology can integrate with any of these environments to deliver true interoperability between joint and coalition forces.
  • Standards-based. REDCOM products are designed to open standards, which enables our customers to reuse existing endpoints without being forced to rip and replace. Interoperability testing — both in-house and at JITC — ensures our products maintain compatibility with both legacy and emerging technologies.
  • Technology-agnostic. REDCOM can connect to a wide range of interfaces, protocols, and endpoints, from legacy systems (such as magneto lines) to today’s over-the-top voice solutions (such as LTE and 5G). As leaders in SIP development, REDCOM can seamlessly connect various SIP networks that have different interpretations of the spec.

Want to know more about REDCOM’s stance on securing the mission at the tactical edge? Check out a recent webinar, hosted by REDCOM Government Account Manager, Courtney Stiles.

Watch the Recording

How REDCOM Secures the Mission Part 2: Resiliency

REDCOM takes a holistic, multi-layer approach to security that goes beyond typical measures such as encryption and validation. Take a look at Secured Communications paper that discusses REDCOM’s stance on overall mission security, which necessitates a strong focus on encryption, resiliency, interoperability, and ease of use. Take a look at part one of our Securing the Mission Series: Technology.

Resiliency

Resiliency refers to the ability of a system to continue operations under adverse conditions. Resiliency has always been an attractive feature of a network, but it has quickly become an essential element of mission security for warfighters at the tactical edge.

REDCOM’s integrated approach delivers mission-critical command and control functionality that offsets cybersecurity concerns while enhancing network resiliency.

REDCOM solutions are:

  • Built for survivability in the field. If the IP-based network is compromised, REDCOM technology allows the sustainment of command and control functions by merely falling back to legacy networks. This level of redundancy allows for the continuity of operations in the limited, intermittent, or denied communication environments.
  • Resilient to hard shut-downs. REDCOM systems do not require the operator to “save” the work before shutting down, which makes our systems resilient to hard or unexpected power-off.
  • Quick to boot up. REDCOM platforms feature extremely rapid boot times. These factors make REDCOM technology ideally suited for tactical deployments and are directly aligned with the DoD’s strategy to become more agile.
  • Hardened. REDCOM solutions can employ “hardened” components that meet the rigors of harsh tactical environments.

 

Want to know more about REDCOM’s stance on securing the mission at the tactical edge? Check out a recent webinar, hosted by REDCOM Government Account Manager, Courtney Stiles.

Watch the Recording

How REDCOM Secures the Mission Part 1: Technology

Introduction

REDCOM takes a holistic, multi-layer approach to security that goes beyond typical measures such as encryption and validation. Take a look at Secured Communications paper that discusses REDCOM’s stance on overall mission security, which necessitates a strong focus on encryption, resiliency, interoperability, and ease of use.

The United States armed forces are facing increased cyber capabilities from our near-peer adversaries, who fully realize how vital communication is to every facet of modern military operations. So, they are becoming more proficient in techniques such as hacking, signal jamming, and disruption.

In today’s information-intense domain, security is absolutely critical to the success of the mission. But what exactly does the term “security” mean? REDCOM has a much broader interpretation of security because we focus on the overall security of the mission.

Missions can be compromised by a variety of factors, including:

  • Single points of failure.
  • Slow boot-up/tear-down times.
  • Interoperability challenges.
  • System complexity.

 

Technology

The above scenarios are clearly security concerns, but they have nothing to do with encryption or validation. This is why REDCOM takes a holistic, multi-layer approach to security. We build security into all of our products from the start.

REDCOM solutions are:

  • Standards-based. REDCOM builds our products to industry standards, ensuring interoperability with a variety of transmission paths, gateways, and endpoints. Users are never locked into proprietary end instruments.
  • Encrypted. We invest in the latest forms of encryption, and allocate significant R&D efforts towards the development of next-generation encryption and authentication technologies.
  • Compliant. REDCOM maintains compliance with numerous DISA and NIAP requirements.
  • Tested & Certified. REDCOM meets stringent session controller functionality and interoperability requirements as defined in the Unified Capabilities Requirements (UCR). We rigorously test our products with the Joint Interoperability Test Command (JITC) to ensure our solutions are certified on the DoDIN Approved Products List. REDCOM Sigma® and the REDCOM Secure Client for Android have passed FIPS 140-2 validation testing, meaning that we can provide standardized, secure solutions for government agencies by appropriately handling SBU data.

 

Want to know more about REDCOM’s stance on securing the mission at the tactical edge? Check out a recent webinar, hosted by REDCOM Government Account Manager, Courtney Stiles.

Watch the Recording

FIPS 140-3: What you need to know

Federal Information Processing Standard (FIPS) is a US government computer security standard used to approve cryptographic modules. REDCOM is FIPS 140-2 validated, which means that our encryption modules have been closely examined by a NIST lab and given a CMVP certificate. But cryptography moves at a rapid pace, and an update to FIPS 140 was certainly overdue.

On March 22, 2019, the Federal Information Processing Standard (FIPS) 140-3 was approved by the US Secretary of Commerce. FIPS 140-3 will be effective as of September 22, 2019 and testing against the new standard will begin a year later, on September 22, 2020. FIPS 140-2 testing will continue for at least a year after FIPS 140-3 testing begins. Certificates have a 5-year sunset period, so FIPS-2 and 140-3 will coexist for a period of time.

REDCOM is aware of what needs to be done to keep up to date with all security protocols. So, what do you need to know in order to begin the FIPS 140-3 validation process? We’ve got it all mapped out for you.

REDCOM CEO Dinah Weisberg joins the Board of Directors for the Greater Rochester Chamber of Commerce

REDCOM Laboratories, Inc. is pleased to announce that President and CEO Dinah Weisberg has been appointed to the Greater Rochester Chamber of Commerce Board of Directors. As a board member for the Chamber, Mrs. Weisberg’s focus will be on elevating Rochester’s reputation as a center for excellence in technology and manufacturing.

“As a member of the Rochester community my entire life, I am convinced we have the best combination of resources, talent, and quality of life right here in upstate New York. That’s why my father chose to start REDCOM in the Rochester area more than 40 years ago,” said Dinah Weisberg. “Rochester is underrated but it has so much potential. As a new board member for the Greater Rochester Chamber of Commerce, I look forward to collaborating with other business leaders in our community to promote growth in the Rochester region.”

Greater Rochester Chamber of Commerce President and CEO Bob Duffy said, “I am pleased to welcome Dinah Weisberg to the Greater Rochester Chamber of Commerce Board of Directors. Dinah’s competitive spirit as both a successful business leader and a race car driver will help drive innovation to better serve our Rochester Chamber membership and the community at large. Her presence on our board is an asset for the entire Rochester and Finger Lakes region.”

About the Greater Rochester Chamber of Commerce

Greater Rochester Chamber of Commerce is the voice for business across the nine-county region that includes Monroe, Genesee, Livingston, Ontario, Orleans, Seneca, Wayne, Wyoming, and Yates counties. The Chamber provides a one-stop source for information, advocacy, human resource services, and networking to help employers grow their businesses, their dreams, and the economy.

About REDCOM Laboratories, Inc.:

Founded in 1978, REDCOM Laboratories, Inc. is a woman-owned small business based in Victor, NY. The company specializes in the design and manufacture of advanced communications solutions with a focus on security, reliability, and interoperability. REDCOM’s customers include all branches of the military, government agencies, emergency responders, integrators, and telecom service providers.