Blog

Read Our Latest Posts

Learn about security trends, cybersecurity news, as well as tips and tricks to keeping your network secure.

Untangle is now part of Arista Networks

“The shift to work from home, shop from home, school at home has dramatically extended the global cyber-attack …

read more

Stay Up to Date

Sign up to receive updates on news, products and more.

Channel Partners Evolve to Enable Hybrid Work and Combat Rising Cyberattacks

As the industry looks toward 2022, it must also acknowledge the recent turbulent past. Through two unprecedented years of a pandemic and reco…

read more

The IoT Makes Life and Work Easier; What That Means for Cybersecurity

The Internet of Things (IoT) is playing an increasingly important role in our business and personal lives. It has evolved to include devices …

read more

The State of Cybersecurity in Education

While recent attacks on infrastructure have taken center stage, what is less publicized is the rise in cyberattacks on schools. In 2020, K-12…

read more

Untangle SD-WAN Router is Now Micro Edge

What’s in a Name?

Starting January 12, 2022, SD-WAN Router will be renamed to Micro Edge.

It has been over two years since w…

read more

2021 Cybersecurity Wrap-up and Trends for 2022

As 2021 wraps up, we’re taking stock of the year from our cybersecurity point of view. After a tumultuous 2020, this year continued to be a r…

read more

How to Reduce the Financial Impact of Cyberattacks to Your Business

There has been a steady stream of significant cyberattacks headlining the news since December 2020 and the Sunburst attack on SolarWinds Orio…

read more

NG Firewall for Home Use

Anyone connecting to the internet needs protection from cyber threats, even from our homes. Home users often rely on the built-in firewall that…

read more

What You Need to Know This Cybersecurity Awareness Month

October often conjures up images of fall leaves, pumpkin lattes, and Halloween. But for IT Security professionals and organizations it’s somethi…

read more

Command Center Centrally Managed Network Orchestration and SD-WAN Router 3.2

On September 14, 2021, we released two new product updates designed to make your job easier. First, with the latest in Command Center, you’ll…

read more

The Role of Cryptocurrency in Ransomware Attacks

Ransomware attacks are on the rise and have recently been front page news with attacks on the Colonial Pipeline, JBS Food and Kaseya. This ever-…

read more

How Secure is Your Network for Hybrid Working?

In 2020, the workplace dramatically changed due to the pandemic. After a prolonged period of employees working remotely, companies are now bringin…

read more

This SysAdmin Day, We Got to Know Our Team Better

Five days a week (yes, sometimes more), we get up and go to work. We fire up our computers, send emails, print documents, video conference with …

read more

Untangle SD-WAN adds Threat Prevention in the latest release

The first half of 2021 has been busy for Untangle, and of all the activity, we are extremely proud of several successful product releases for bo…

read more

How Will Artificial Intelligence and Cybersecurity Be Seen Moving Forward?

Artificial intelligence (AI) in cybersecurity can be a double-edged sword. While AI can effectively mitigate threats and prevent potential cyber…

read more

Is Your Network Security Ready to Get Students Back to the Classroom?

As more districts and universities re-open for in-person classes again, it’s hard not to reflect on the turmoil of the last year. At the blink o…

read more

Ransomware 2021 has evolved. Are you keeping up with network security?

As we head deeper into 2021, it’s beginning to feel like there’s a light at the end of the tunnel and we can all take a deep breath. 2020 was a …

read more

Can Zero Trust security models work with your VPN?

One lesson from the last year that most companies seemed to have learned is that cyber criminals don’t take time off. During the pandemic, cyber…

read more

What to Know About Zero-day Threats Before They Threaten Your Business

Making headlines lately have been well publicized, large cyberattacks including the Sunburst exploit of SolarWinds Orion Platform and most recen…

read more

VLANs Streamline Network Connectivity and Increase Security

Network administrators now have a new tool in their arsenal as they work to increase network efficiency and minimize operational costs. Using vi…

read more

Untangle SD-WAN Router 3.0 Network Security for Your Workforce

While security breaches of large global companies are often front-page news, SMBs aren’t immune to cyber attacks. In fact, according to the Veri…

read more

Can the healthcare industry stay ahead of cybercriminals?

The healthcare industry, like many others, has been the victim of numerous cyber attacks. In fact, healthcare breaches became front-page news in…

read more

How SMBs met the 2020 challenge and predictions for 2021

Throughout these challenging times, our channel partners have kept their finger on the pulse of network security for small and medium businesses…

read more

Employee Cybersecurity: Prevent Holiday Shopping from Compromising Your Network

Employees are continuing to work from home as more and more cases of the pandemic come to light. This increase in cases means that working from h…

read more

Choosing the Right VPN for Your Business

VPN Usage has been critical during the coronavirus pandemic. Virtual Private Networks have allowed employees to safely connect to corporate netwo…

read more

Top Barriers to IT Security for SMBs

Small and medium-sized businesses (SMBs) continue to play a foundational role to the economic success of many communities, cities, and states,and …

read more

How Resilient is your Nonprofit to a Cyberattack?

Nonprofit organizations can range from local community centers to large-scale operations such as city wide food banks or museums. These organizat…

read more

Identifying COVID-19 Phishing Scams

As we continue to move through 2020 it has become very clear that cyber criminals are taking advantage of the COVID-19 crisis as they continue to…

read more

Building a Network Security Solution: NG Firewall and Endpoint Security

As 2020 started, ransomware and phishing attacks continued to make the news. As we moved into May, it became clear that hackers were taking adva…

read more

SMBs Benefit from SD-WAN Features for Branch Offices Connectivity

Small businesses continue to transform the way they do business through advanced technology and connectivity options. One of the latest technologi…

read more

Q&A with Heather Paunet About Untangle and Education

With K-12 cyber incidents, what are the most common types of incidents, and do we find that one is more successful than another?

Heather Paunet
Se…

read more

Cloud-Based Firewalls Are Key to Protecting Employees While Working Remotely

The business environment has changed due to the global coronavirus pandemic. To combat the spread of this virus, many businesses transitioned the…

read more

5 Ways to Strengthen your Password

We use passwords to secure a variety of personal and professional accounts. These accounts protect important data such as ourbanking information,…

read more

Reminders for Enabling Employees to Work From Home to Combat COVID-19

With more cases of COVID-19 (the coronavirus) coming to light, many employers have taken the precaution of transitioning and encouraging employee…

read more

IP Reputation Scores: Additional Security for SMBs

Cybercriminals continue to find new ways toto deliver malware, DDoS and other attacks. These attacks can have substantial consequences for business…

read more

5 2020 Cybersecurity Resolutions for SMBs

During our 2019 SMB IT Security Report, we learned that small and mid-sized businesses still struggle to implement network security solutions. SMBs…

read more

Securing Your Network in Preparation for the Holidays

The holiday shopping season is upon us. Kicking off with Small Business Saturday – a chance for customers to explore local or regional small busine…

read more

The Benefits of SD-WAN for Branch Office Connectivity

A wide-area network, or WAN, is necessary for any company that is seeking to expand or has resources separated by distance. It allows separate bra…

read more

The Cost of Ransomware Attacks on Cities

Ransomware attacks on cities are becoming more prevalent with ransom demands increasing with each attack. Recently, two cities have gone against co…

read more

Protecting Healthcare Networks Against Threats

In today’s digitally connected world, cybersecurity is a critical concern for all industries. However, for the healthcare industry, the failure to …

read more

Why Should I Update My Firewall?

Staying up to date with your network security appliance is absolutely necessary. For the same reasons we regularly update our phones, browsers, and…

read more

A Family Affair: Protecting Your Home Networks & Devices

There has been an enormous increase in attacks on mobile and IoT devices in recent years. In 2018, one third of all attacks targeted mobile devices…

read more

Security is Everyone’s Responsibility in the Organization

The days when security was only the IT department’s headache are long gone. Today, everyone in an organization has to take personal responsibility …

read more

Safeguarding the Nation’s Critical Infrastructure

The resilience of critical infrastructure is a key factor in the security of any nation. The US security infrastructure has sixteen sectors whose a…

read more

Cybersecurity Professionals: Path to Job Security

Checking the news these days can be a scary proposition. With daily headlines about major corporate breaches, ransomware, and cryptojacking, consum…

read more

3 Ways to Attempt BYOD and IoT Security

A decade ago, when smartphones started to penetrate the corporate world, IT managers had to consider the implications of Bring Your Own Device (BYO…

read more

Network Security Entering No-Content Era

Firewalls have changed a great deal over the past 20 years. Originally, firewalls were just a simple set of rules to do packet filtering. Though th…

read more

Ransomware in the spotlight: How to guard against attack

Is there anything more frightening than being locked out of your most important and sensitive files? This is just the reality that a number of…

read more

4 Resolutions You Can Make to Secure Your Network in the New Year

2017 is almost upon us, and now is the time for IT leaders and network administrators to take a hard look at their technology resources. As this ye…

read more

What should school districts know about CIPA compliance?

Technological advancements including mobile devices, intelligent software and other learning tools are changing the way educators teach and shiftin…

read more

3 Network Horror Stories that Keep IT Up at Night

Any horror fan knows that the best – not to mention most bone-chilling – stories are always rooted in truth.

The same is true for network attacks …

read more

4 Scariest Threats to your Network

It’s that time of year again: Children dress up in costume, adults adorn their houses with spooky decorations and it’s simply fun to be a little sc…

read more

Illinois Election System Breached

This election cycle has provided more than a few noteworthy headlines. Some of the most recent, however, don’t comment on the candidates, but rathe…

read more

How hospitals can get control over their sprawling networks

Hospitals are more commonly embracing digitalization and the benefits of our increasingly connected world. Whether due to pressure from government …

read more

Top 3 features that hotels need in their network security solution

Recently, there has been considerable attention surrounding the issue of network security at hotels and resorts. These networks have been notorious…

read more

School’s in session, but is your network ready?

For students, teachers, administrators and others involved in the education sector, this season means one thing: back to school. As parents make ef…

read more

What can hospitals learn from the Kansas Heart Hospital breach?

It’s a story similar to many others that have been taking place over the last few years. Employees and executives come into their place of business…

read more

4 things all nonprofits need to know about network security

Nonprofits face unique challenges when it comes to ensuring network security. Unlike many organizations in the private sector, nonprofits need to c…

read more

The network’s role in IoT security

The Internet of Things is one of the biggest trends in the technology world today, growing by leaps and bounds. According to Gartner, an estimated …

read more

Is recreational traffic slowing down your network?

At most organizations, are people working hard or hardly working? If internet usage statistics are any indication, the latter is true. For starters…

read more

Network Setup 4 Best Practices

In order to help protect key information and databases, many organizations will be very particular in how they set up their network and what protec…

read more

Admin is Root

It’s that time again. Yet another security researcher has discovered and “disclosed” that in Untangle “admins” have administrator privileges. In Un…

read more

Back-to-school tips for education networks

While it may seem like just yesterday that the bell rang on the last day of the school year, in short order the kids will be back in school for the…

read more

How to keep ransomware attacks away from backups

Since its emergence,  the numerous variants of ransomware have wreaked havoc on networks and computers worldwide. By encrypting files and not relea…

read more

4 ways to stop insider threats

Most discussions around data breaches and cybercriminal activity focus on external players like hackers. But, this is only skimming the surface reg…

read more

How to declare your independence from spam

Unlike the canned meat, which has both its supporters and detractors, spam email is loved by no one – except perhaps cybercriminals. Whil…

read more

The most effective firewall features to use

Firewalls have long been part of an effective network monitoring and protection scheme, and that remains the case still today. But, not all firewal…

read more

What is the future of SSL?

As a way to encrypt and thus keep web traffic away from prying eyes, the Secure Sockets Layer protocol has been the go-to option for e-commerce fir…

read more

Stay Up to Date