Loch Technology Blog
LOCH provides full and actionable intelligence on all wireless and IoT devices to help organizations improve their security posture, reduce risk, and manage wireless data usage across the enterprise.
![](https://loch.io/hubfs/Imported_Blog_Media/pipeline-blog-image.png)
Colonial Pipeline Ransomware Attack: The Urgent Need to Secure Internet-Connected Infrastructure from New Threats
On May 7th, reports surfaced that Colonial Pipeline, operators of the country’s largest fuel pipeline, were impacted by a ransomware attack from hackers linked to Eastern European..
![](https://loch.io/hubfs/Imported_Blog_Media/GettyImages-1182616138.jpg)
Digitized Healthcare and the Growing Need to Secure Wireless IoMT Devices
For healthcare organizations, digital transformation has become fundamental to patient care, providing a more personalized patient experience and delivering more targeted,..
![](https://loch.io/hubfs/Imported_Blog_Media/Healthcare_Illustration.png)
MEDIA ALERT: LOCH Technologies to Host Healthcare Panel on Securing the IoMT Mobile Edge Featuring Experts from CSO Advisors, SCL Health and Cottage Health
EMERYVILLE, Calif. — Feb. 18, 2021 — LOCH Technologies, the leader in wireless IoT security, today announced a who’s who lineup of industry luminaries for a Feb. 22 virtual..
![](https://loch.io/hubfs/Imported_Blog_Media/post-image-loch-tech-iot-1.png)
LOCH Technologies IoT and Wireless Security Predictions 2021
Home wireless networks, smart cities, industry-specific deployments, and government services top list of rapid IoT adoption in 2021 that will be more vulnerable due to expanding..
![](https://loch.io/hubfs/Imported_Blog_Media/post-image-03.png)
802 Secure Rebrands to LOCH Technologies and Reaffirms Commitment to Securing Cellular and Wireless IoT Devices as Attack Surfaces Increase
Company offers customers visibility and security for all 5G wireless, OT, and IoT devices
![](https://loch.io/hubfs/Imported_Blog_Media/post-image-5g.png)
From Ethernet to wireless to 5G and beyond: Why we’re changing our name to LOCH Technologies
When we founded 802 Secure back in 2014, it was at a time when WiFi devices dominated the enterprise airwaves — a known quantity. In other words, the entire wireless threat..
![](https://loch.io/hubfs/Imported_Blog_Media/INSECURE-IOT-CAN-AFFECT-ALL-OF-US.jpg)
Insecure IoT Can Affect All of Us
For years, futurists and, of course, the technology industry, have been writing about how the internet of things (IoT) is going to dramatically change how we work and how we live...
![](https://loch.io/hubfs/Imported_Blog_Media/GOOD-START-TO-IOT-SECURITY-IN-CALIFORNIA.jpeg)
Good start to IoT Security in California
https://www.securitymagazine.com/articles/91689-californias-other-game-changer-complying-with-the-new-iot-cybersecurity-law
![](https://loch.io/hubfs/Imported_Blog_Media/FCCS-6GHZ-PROPOSAL-MARKS-THE-NEXT-GREAT-LEAP-IN-WIRELESS-TECHNOLOGY.jpeg)
FCC’s 6GHz Proposal Marks the Next Great Leap in Wireless Technology
https://blogs.cisco.com/gov/fccs-6ghz-proposal-marks-the-next-great-leap-in-wireless-technology
![](https://loch.io/hubfs/Imported_Blog_Media/KR00K-VULNERABILITY-EXPOSED-DATA-FROM-OVER-A-BILLION-WI-FI-DEVICES.jpeg)
Kr00k Vulnerability Exposed Data From Over a Billion Wi-Fi Devices
https://www.securityweek.com/kr00k-vulnerability-exposed-data-over-billion-wi-fi-devices