Mark Dargin

Mark Dargin is an experienced network and security architect/leader. He has over 18 years of experience designing, managing, and securing complex WAN and LAN infrastructures for large and medium-sized organizations.

Mark’s experience includes leading and managing large scale compliance and risk management initiatives and programs. He is a member of the Michigan Cybersecurity Civilian Corps., a rapid response team of experienced IT security volunteers who will assist the state and industries during major cybersecurity incidents. He is also a graduate of the FBI citizen’s academy in Detroit and a member of InfraGard.

  Mark holds a bachelor’s degree in Business Management and Communications from the University of Michigan-Dearborn and a master’s degree in Business Information Technology from Walsh College in Troy, Michigan. He recently completed the Advanced Computer Security Certificate program at Stanford University. Mark holds various active certifications, including the CISSP (Certified Information Systems Security Professional), CCNP (Cisco Certified Network Professional), PMP (Project Management Professional), GIAC GMON (Continuous Monitoring & Security Operations), CCSA (Checkpoint Certified Security Administrator) and ITIL (Information Technology Infrastructure Library).

How to protect your infrastructure from DNS cache poisoning

Prepare for the future without net neutrality

Prepare for the future without net neutrality

With the end of net neutrality, it is important for organizations to prepare for any potential changes in their internet service.

What to do if your cloud provider stops offering its services

What to do if your cloud provider stops offering its services

Any cloud provider can go out of business or stop offering it services, so it is critical to have a contingency plan in place if it happens.

Secure your SDN controller

Secure your SDN controller

Security is one of the biggest challenges facing software-defined networks. To prevent unauthorized activity, it is essential that you secure your SDN controller.

Increase your network security: Deploy a honeypot

Increase your network security: Deploy a honeypot

Deploying a honeypot system on your internal network is a proactive measure that enables you to immediately detect an intruder before any data is damaged or stolen.

Always test remote app performance with a WAN emulator

Always test remote app performance with a WAN emulator

When you test new applications using a WAN emulator before deployment, you ensure apps perform to remote users’ standards and requirements.

How to protect your network from ransomware attacks

How to protect your network from ransomware attacks

This 7-step plan, which includes backup and recovery, network monitoring, and antivirus, will help prevent a ransomware attack on your company.

4 steps to planning a migration from IPv4 to IPv6

4 steps to planning a migration from IPv4 to IPv6

Waiting to address IPv6 carries a risk of lost communication, revenue and customers.

Time to consider a move to IPv6

Time to consider a move to IPv6

The growth of the IoT means organizations need to start considering migrating to IPv6. Failing to migrate will restrict their ability to be flexible and innovative.

Is protected health information safe in the cloud?

Is protected health information safe in the cloud?

More healthcare providers are storing protected health information (PHI) in the cloud, and certain actions must be taken to secure it.

How to protect your data when using public Wi-Fi

How to protect your data when using public Wi-Fi

Hackers love public Wi-Fi. Unsuspecting victims often fall into their traps. To protect your data when using public Wi-Fi, follow these four steps.

How to protect against cross-site request forgery attacks

How to protect against cross-site request forgery attacks

Cross-site request forgery (CSRF) attacks are becoming more sophisticated, but there are many ways you can prevent them.

Load More