NG Firewall for Home Use

Anyone connecting to the internet needs protection from cyber threats, even from our homes. Home users often rely on the built-in firewall that comes with their router which generally has very basic functionality such as content filtering and parental controls. However, to protect computers and IoT devices, a home user/worker should upgrade their firewall software […]

Posted in Untangle | Tagged , , , , , , | Comments Off on NG Firewall for Home Use

Protecting Healthcare Networks Against Threats

In today’s digitally connected world, cybersecurity is a critical concern for all industries. However, for the healthcare industry, the failure to ensure resilience against cyber threats could be a matter of life and death. According to a 2018 Thales Security Report, a staggering 77% of US healthcare organizations have been breached at some point in […]

Posted in Untangle | Tagged , , , , , , , , , , , , , , , , , | Comments Off on Protecting Healthcare Networks Against Threats

A Family Affair: Protecting Your Home Networks & Devices

There has been an enormous increase in attacks on mobile and IoT devices in recent years. In 2018, one third of all attacks targeted mobile devices, and IoT attacks grew 600% between 2016 and 2017. While these attacks are not new news for businesses, they are now impacting home and personal users who do not […]

Posted in Untangle | Tagged , , , , , , , , , , | Comments Off on A Family Affair: Protecting Your Home Networks & Devices

Security is Everyone’s Responsibility in the Organization

The days when security was only the IT department’s headache are long gone. Today, everyone in an organization has to take personal responsibility for security and network safety. A big reason is the transformation in the modern workplace. In the past, IT departments had strict control over gateways, firewalls, and networks. With the advent of […]

Posted in Untangle | Tagged , , , , , , , , , , , , | Comments Off on Security is Everyone’s Responsibility in the Organization

3 Ways to Attempt BYOD and IoT Security

A decade ago, when smartphones started to penetrate the corporate world, IT managers had to consider the implications of Bring Your Own Device (BYOD) for their organization’s security. Now the proliferation of the Internet of Things (IoT) or connected devices has added an additional layer of complexity. Organizations are trying to keep pace with the […]

Posted in Untangle | Tagged , , , , , , , , | Comments Off on 3 Ways to Attempt BYOD and IoT Security

The network’s role in IoT security

The Internet of Things is one of the biggest trends in the technology world today, growing by leaps and bounds. According to Gartner, an estimated 6.4 billion connected objects will be in existence by the end of this year, and approximately 25 billion IP-connected things may be around in 2020. Should these predictions come true, […]

Posted in Untangle | Tagged , , , , | Comments Off on The network’s role in IoT security

Admin is Root

It’s that time again. Yet another security researcher has discovered and “disclosed” that in Untangle “admins” have administrator privileges. In Untangle, and in general English, “admin” is abbreviation for “administrator.” If an admin creates a new set of admin credentials (a username/password) and provides those credentials to a person, then that person now has administrator […]

Posted in Untangle | Tagged , , , , , | Comments Off on Admin is Root