Back-to-school tips for education networks

While it may seem like just yesterday that the bell rang on the last day of the school year, in short order the kids will be back in school for the next academic year. Summer is a time for students and teachers to relax, but not for IT administrators and staff. This period when kids […]

Posted in Untangle | Tagged , , , , , , , | Comments Off on Back-to-school tips for education networks

How to keep ransomware attacks away from backups

Since its emergence,  the numerous variants of ransomware have wreaked havoc on networks and computers worldwide. By encrypting files and not releasing them until a ransom is paid, ransomware has proven to be especially effective and lucrative for cybercriminals. Even backups are no longer safe from ransomware. But, with a little knowledge and the right […]

Posted in Untangle | Tagged , , , , , , , | Comments Off on How to keep ransomware attacks away from backups

How to declare your independence from spam

Unlike the canned meat, which has both its supporters and detractors, spam email is loved by no one – except perhaps cybercriminals. While spam emails have been around for decades, they remain all too prevalent today. But, there are some easy ways to keep spam out of any inbox. Current state of spam The message that is […]

Posted in Untangle | Tagged , , , , | Comments Off on How to declare your independence from spam

The most effective firewall features to use

Firewalls have long been part of an effective network monitoring and protection scheme, and that remains the case still today. But, not all firewalls are as effective as others, and each one has its upsides and downsides for every organization. Here are four firewall features to consider: 1) Geolocation by IP This filter works by […]

Posted in Untangle | Tagged , , , , , , | Comments Off on The most effective firewall features to use