IP Reputation Scores: Additional Security for SMBs
Cybercriminals continue to find new ways toto deliver malware, DDoS and other attacks. These attacks can have substantial consequences for businesses and their stolen customer data. But what can small businesses and organizations do to prevent these attacks from happening? To keep up with the increased volume of attacks stemming from websites, emails, malicious files […]
Is recreational traffic slowing down your network?
At most organizations, are people working hard or hardly working? If internet usage statistics are any indication, the latter is true. For starters, a 2010 report found that 10 percent of all business bandwidth is used for YouTube, while close to 7 percent of all links clicked by employees are related to Facebook. In the […]
Network Setup 4 Best Practices
In order to help protect key information and databases, many organizations will be very particular in how they set up their network and what protection mechanisms they put in place. But how it actually occurs and what specifically is used can vary dramatically from one organization to the next. A well-organized and well-protected network should […]
Admin is Root
It’s that time again. Yet another security researcher has discovered and “disclosed” that in Untangle “admins” have administrator privileges. In Untangle, and in general English, “admin” is abbreviation for “administrator.” If an admin creates a new set of admin credentials (a username/password) and provides those credentials to a person, then that person now has administrator […]
4 ways to stop insider threats
Most discussions around data breaches and cybercriminal activity focus on external players like hackers. But, this is only skimming the surface regarding the multitudinous threats that organizations face today. In fact, insiders are increasingly playing a large, outsized role in many data leaks. According to the 2016 Data Breach Investigations Report from Verizon, insider threats […]