A Family Affair: Protecting Your Home Networks & Devices

There has been an enormous increase in attacks on mobile and IoT devices in recent years. In 2018, one third of all attacks targeted mobile devices, and IoT attacks grew 600% between 2016 and 2017. While these attacks are not new news for businesses, they are now impacting home and personal users who do not […]

Posted in Untangle | Tagged , , , , , , , , , , | Comments Off on A Family Affair: Protecting Your Home Networks & Devices

Safeguarding the Nation’s Critical Infrastructure

The resilience of critical infrastructure is a key factor in the security of any nation. The US security infrastructure has sixteen sectors whose assets, systems, and networks influence food supply, water, financial services, public health, power and more. Previously, cybercriminals used to ignore local sectors like state/municipal governments and first responders to go after larger […]

Posted in Untangle | Tagged , , , , , , , , , , | Comments Off on Safeguarding the Nation’s Critical Infrastructure

Cybersecurity Professionals: Path to Job Security

Checking the news these days can be a scary proposition. With daily headlines about major corporate breaches, ransomware, and cryptojacking, consumers are very worried about the privacy of their data and security of their digital assets. According to one recent market report, global cybersecurity spending will exceed $1 trillion dollars from 2017 to 2021. Cybersecurity […]

Posted in Untangle | Tagged , , , , , , , , , , , , | Comments Off on Cybersecurity Professionals: Path to Job Security

Network Security Entering No-Content Era

Firewalls have changed a great deal over the past 20 years. Originally, firewalls were just a simple set of rules to do packet filtering. Though they were not designed to deal with many of the problems that came later, firewalls are still a useful and necessary tool in the security arsenal. Soon administrators needed to […]

Posted in Untangle | Tagged , , , , , , , , , , , , , , , | Comments Off on Network Security Entering No-Content Era

4 Scariest Threats to your Network

It’s that time of year again: Children dress up in costume, adults adorn their houses with spooky decorations and it’s simply fun to be a little scared. And while this spirit of ghouls, ghosts and goblins surrounds us during the fall, there’s nothing fun about threats to your company’s network. This asset literally forms the […]

Posted in Untangle | Tagged , , , , , , , , , , | Comments Off on 4 Scariest Threats to your Network

Top 3 features that hotels need in their network security solution

Recently, there has been considerable attention surrounding the issue of network security at hotels and resorts. These networks have been notoriously insecure, particularly in the eyes of travelers who have heard horror stories about public, unprotected Wi-Fi at hospitality institutions. Now, however, it’s time for this industry to do better. Many decision-makers are seeking solutions […]

Posted in Untangle | Tagged , , , , , , | Comments Off on Top 3 features that hotels need in their network security solution

4 things all nonprofits need to know about network security

Nonprofits face unique challenges when it comes to ensuring network security. Unlike many organizations in the private sector, nonprofits need to create a secure network environment on a tight budget and often without the assistance of a dedicated IT staff. Still, ensuring network security is just as important for charities and other not-for-profit organizations as […]

Posted in Untangle | Tagged , , , , , | Comments Off on 4 things all nonprofits need to know about network security

Network Setup 4 Best Practices

In order to help protect key information and databases, many organizations will be very particular in how they set up their network and what protection mechanisms they put in place. But how it actually occurs and what specifically is used can vary dramatically from one organization to the next. A well-organized and well-protected network should […]

Posted in Untangle | Tagged , , , , , | Comments Off on Network Setup 4 Best Practices

Back-to-school tips for education networks

While it may seem like just yesterday that the bell rang on the last day of the school year, in short order the kids will be back in school for the next academic year. Summer is a time for students and teachers to relax, but not for IT administrators and staff. This period when kids […]

Posted in Untangle | Tagged , , , , , , , | Comments Off on Back-to-school tips for education networks

4 ways to stop insider threats

Most discussions around data breaches and cybercriminal activity focus on external players like hackers. But, this is only skimming the surface regarding the multitudinous threats that organizations face today. In fact, insiders are increasingly playing a large, outsized role in many data leaks. According to the 2016 Data Breach Investigations Report from Verizon, insider threats […]

Posted in Untangle | Tagged , , , , , , , | Comments Off on 4 ways to stop insider threats