Building a Network Security Solution: NG Firewall and Endpoint Security
As 2020 started, ransomware and phishing attacks continued to make the news. As we moved into May, it became clear that hackers were taking advantage of online content related to COVID-19 and the new dispersed workforce. According to CheckPoint Research (qtd Dark Reading), 192,000 COVID-19 related attacks were happening per week with many of them […]
A Family Affair: Protecting Your Home Networks & Devices
There has been an enormous increase in attacks on mobile and IoT devices in recent years. In 2018, one third of all attacks targeted mobile devices, and IoT attacks grew 600% between 2016 and 2017. While these attacks are not new news for businesses, they are now impacting home and personal users who do not […]
3 Ways to Attempt BYOD and IoT Security
A decade ago, when smartphones started to penetrate the corporate world, IT managers had to consider the implications of Bring Your Own Device (BYOD) for their organization’s security. Now the proliferation of the Internet of Things (IoT) or connected devices has added an additional layer of complexity. Organizations are trying to keep pace with the […]
What should school districts know about CIPA compliance?
Technological advancements including mobile devices, intelligent software and other learning tools are changing the way educators teach and shifting the way students participate in their own education. As institutions continue to add more innovative endpoints and platforms, it’s important that they also consider the requirements of the Children’s Internet Protection Act. CIPA is critical for […]
The network’s role in IoT security
The Internet of Things is one of the biggest trends in the technology world today, growing by leaps and bounds. According to Gartner, an estimated 6.4 billion connected objects will be in existence by the end of this year, and approximately 25 billion IP-connected things may be around in 2020. Should these predictions come true, […]
Network Setup 4 Best Practices
In order to help protect key information and databases, many organizations will be very particular in how they set up their network and what protection mechanisms they put in place. But how it actually occurs and what specifically is used can vary dramatically from one organization to the next. A well-organized and well-protected network should […]
Admin is Root
It’s that time again. Yet another security researcher has discovered and “disclosed” that in Untangle “admins” have administrator privileges. In Untangle, and in general English, “admin” is abbreviation for “administrator.” If an admin creates a new set of admin credentials (a username/password) and provides those credentials to a person, then that person now has administrator […]