Rock Glossary

first_imgLearn these common climbing terms and you just might avoid an embarrassing situation if you’re asked to “flash.”AreteAn outside corner on a rock face, like corners of a pyramid.ButtressA rock formation that projects out from the main face or cliff.ChimneyA wide crack usually big enough to fit the climber’s entire body inside.CruxThe most difficult portion of a climb. Usually, the crux is a single move or a short sequence of moves.DihedralWhere two walls meet to form an inside corner.FlashTo successfully send a route the first time without practicing itLeadingSending a sport or trad route first, either placing protection as you go or clipping in to existing bolts. The level of risk is higher when leading, as you’re not automatically anchored to the rock.PitchThe distance climbed with one length of rope. Climbs can be single-pitch or multi-pitch. Table Rock, N.C. is famous for its multi-pitch routes (600 feet long), whereas Sunset Rock, Tenn., is known for its single-pitch routes (less than 80 feet).ProblemA bouldering term, meaning the path the climber takes to complete the climb. A bouldering problem is the equivalent of a climbing route.SendTo successfully complete, or “ascend,” a route.last_img read more

5 steps toward increasing your firewall security

first_imgOctober is National Cybersecurity Awareness Month, which means it’s a fitting time for financial institutions to examine their cybersecurity efforts and protocols, and make any necessary adjustments. However, with such high-profile cybercrimes as WannaCry, Petya and the Equifax breach dominating headlines this year, financial institutions hardly need a reminder of the threats that cyberattacks pose. The frightening diversity and sophistication of these immense attacks, as well as the unfortunate promise of future strikes, have left pressing questions on how best to quell them—many of which remain largely unanswered. But where do financial institutions even begin? The nature of cybercrime is complex, and the relentlessness of ransomware, the diligence of DDoS and the frequency of fraud are enough to leave even the most seasoned cybersecurity professionals cross-eyed. Although these cyber adversaries are indeed daunting, there’s no need to be overwhelmed. The best place to start is with a fundamental element of any institution’s cybersecurity efforts—a strong firewall.What is a Firewall?A firewall is one of the most basic, yet essential, cybersecurity tools available to financial institutions. Firewalls act as a gatekeeper for your network, protecting it from the outside global network by inspecting all inbound or outbound traffic and determining if it meets the criteria to pass through. Without a firewall, any hacker could easily breach your network and cause havoc. Likewise, a misconfigured or out-of-date firewall provides little protection.Regulations Surrounding FirewallsIn 2011, the FFIEC issued its Cybersecurity Assessment Tool, or CAT, which details financial institutions’ regulatory requirements for maintaining firewalls. In understanding the tremendous risk that follows poor firewall architecture, the FFIEC also mandated that financial institutions be subject to quarterly audits of their firewall security protocols. These regulatory requirements, coupled with the threat of looming cybercrime, have forced the hands of many credit unions across the country. Now, more than ever, financial institutions must look at their firewall security efforts and ensure they are not only compliant, but also risk averse. 5 Steps to Strong Firewall Security Firewall security starts with these five steps, which ensure your institution’s firewall remains strong and secure: Get in the Head of a Cybercriminal. Ask yourself the question: is our firewall hackable? Answer that question by actively attempting to bypass your firewall, or incorporate the services of a firewall security vendor to weed out any vulnerabilities. Once you’ve identified these vulnerabilities, or “holes,” patch them to ensure cybercriminals don’t have access. Verify Rule Efficiency. Firewalls operate on a set of rules that allow certain traffic in and out of your network. Be sure to update this ruleset regularly, accounting for new threats, and that all current rules are still efficient and relevant. Often, breaches result from old configuration that’s no longer applicable or relevant at the time of the breach.Monitor Security Proactively. Deploying a firewall and ensuring it remains current with regular vulnerability checkups and firewall reviews is important. Take it a step further by proactively monitoring firewall events. This gives you a fighting chance toward knowing when attacks are happening and if a breach occurred, so that proper steps can be taken.Examine Password Credentials. Passwords are an essential element for keeping your institution’s data secure. Ensure that all employees with rights to sensitive data have complex passwords that have the appropriate length and strength. Keep Your Firewall Updated. Remember, the FFIEC requires quarterly audits to review your institution’s firewall security. However, just sticking to the bare minimum of these requirements exponentially increases both your risk and vulnerability—putting your institution at the mercy of cybercriminals eager to steal passwords, customer data and even funds. It is imperative that you keep your institution’s firewall security top of mind. Ensure that your institution has adequate firewall security and meets regulatory guidelines with a firewall review and audit. Doing so allows you to discover and address any vulnerabilities ahead of regulators—and more importantly—cybercriminals. 9SHARESShareShareSharePrintMailGooglePinterestDiggRedditStumbleuponDeliciousBufferTumblr,Shawn Eftink Shawn Eftink is a product manager for CSI’s Managed Services Division. He has more than 20 years of industry experience and holds professional certifications including ITIL, CSM, CCDA and CCNA.  Web: www.csiweb.com Detailslast_img read more

Dorothy H. Webb

first_imgMemorial contributions may be directed to a charity of choice.  To sign the online guestbook or to leave a personal condolence, please visit www.cookrosenberger.com.  The staff of Cook Rosenberger Funeral Home is honored to care for the family of Dorothy Webb. Friends may visit with the family on Wednesday, March 1, 2017 from 10 to 11 a.m. at Cook Rosenberger Funeral Home, 929 Main Street, Brookville.  Services will begin at 11 a.m. and burial will follow in Orange North Cemetery in Fayette County. Dorothy H. Webb, of Connersville, was born on November 17, 1927 the daughter of Oscar and Ada Gibson Hensley.  She married Marshall T. Webb in 1945 and he preceded her in death in 1983.  Dorothy was a devoted wife, and mother.  She loved the Lord and faithfully attended church as often as she could.  On Wednesday, February 22, 2017 at the age of 89, Dorothy passed away at her residence.center_img Those surviving who will cherish Dorothy’s memory include her children, Carol (Gene) Byrd of Liberty, Becky (Charles) Holliday of Connersville, and Mark Thomas (Stacy) Webb of Eaton, OH; 10 grandchildren, 11 great grandchildren; sisters, Nancy Abernathy of Brookville, Edith Grant of Blooming Grove and Doris Jackson of Maryland.  Besides her parents and husband, she was preceded in death by 2 daughters, Shirley Ann Richardson and Betty Jean Norman, and an infant son, David Michael Webb.last_img read more