Mark Dargin

Mark Dargin is a Senior Network Security Engineer for GE Healthcare’s Customer Technology & Cloud Services Team. He has over 16 years of experience designing, managing and securing complex WAN and LAN infrastructures for large and medium-sized organizations.

Mark’s experience includes leading and managing large scale compliance and risk management initiatives and programs. He is a member of the Michigan Cybersecurity Civilian Corps., a rapid response team of experienced IT security volunteers who will assist the state and industries during major cybersecurity incidents. He is also a graduate of the FBI citizen’s academy in Detroit and a member of InfraGard.

  Mark holds a bachelor’s degree in Business Management and Communications from the University of Michigan-Dearborn and a master’s degree in Business Information Technology from Walsh College in Troy, Michigan. He recently completed the Advanced Computer Security Certificate program at Stanford University. Mark holds various active certifications, including the CISSP (Certified Information Systems Security Professional), CCNP (Cisco Certified Network Professional), PMP (Project Management Professional), GIAC GMON (Continuous Monitoring & Security Operations), CCSA (Checkpoint Certified Security Administrator) and ITIL (Information Technology Infrastructure Library).

Secure your SDN controller

Increase your network security: Deploy a honeypot

Increase your network security: Deploy a honeypot

Deploying a honeypot system on your internal network is a proactive measure that enables you to immediately detect an intruder before any data is damaged or stolen.

Always test remote app performance with a WAN emulator

Always test remote app performance with a WAN emulator

When you test new applications using a WAN emulator before deployment, you ensure apps perform to remote users’ standards and requirements.

How to protect your network from ransomware attacks

How to protect your network from ransomware attacks

This 7-step plan, which includes backup and recovery, network monitoring, and antivirus, will help prevent a ransomware attack on your company.

4 steps to planning a migration from IPv4 to IPv6

4 steps to planning a migration from IPv4 to IPv6

Waiting to address IPv6 carries a risk of lost communication, revenue and customers.

Time to consider a move to IPv6

Time to consider a move to IPv6

The growth of the IoT means organizations need to start considering migrating to IPv6. Failing to migrate will restrict their ability to be flexible and innovative.

Is protected health information safe in the cloud?

Is protected health information safe in the cloud?

More healthcare providers are storing protected health information (PHI) in the cloud, and certain actions must be taken to secure it.

How to protect your data when using public Wi-Fi

How to protect your data when using public Wi-Fi

Hackers love public Wi-Fi. Unsuspecting victims often fall into their traps. To protect your data when using public Wi-Fi, follow these four steps.

How to protect against cross-site request forgery attacks

How to protect against cross-site request forgery attacks

Cross-site request forgery (CSRF) attacks are becoming more sophisticated, but there are many ways you can prevent them.

Internet VPN or MPLS for branch office IP phone communication?

Internet VPN or MPLS for branch office IP phone communication?

Before you choose internet VPN or MPLS for branch office IP phone communication, do a cost-benefit analysis.

Encryption critical for protecting mobile device data

Encryption critical for protecting mobile device data

More and more personal data is being stored on mobile devices, and without encryption, this data can easily fall into the wrong hands.

Load More