IP Reputation Scores: Additional Security for SMBs

Cybercriminals continue to find new ways toto deliver malware, DDoS and other attacks. These attacks can have substantial consequences for businesses and their stolen customer data. But what can small businesses and organizations do to prevent these attacks from happening? To keep up with the increased volume of attacks stemming from websites, emails, malicious files […]

Posted in Untangle | Tagged , , , , , , , , , | Comments Off on IP Reputation Scores: Additional Security for SMBs

Is recreational traffic slowing down your network?

At most organizations, are people working hard or hardly working? If internet usage statistics are any indication, the latter is true. For starters, a 2010 report found that 10 percent of all business bandwidth is used for YouTube, while close to 7 percent of all links clicked by employees are related to Facebook. In the […]

Posted in Untangle | Tagged , , , , , , | Comments Off on Is recreational traffic slowing down your network?

Network Setup 4 Best Practices

In order to help protect key information and databases, many organizations will be very particular in how they set up their network and what protection mechanisms they put in place. But how it actually occurs and what specifically is used can vary dramatically from one organization to the next. A well-organized and well-protected network should […]

Posted in Untangle | Tagged , , , , , | Comments Off on Network Setup 4 Best Practices

Admin is Root

It’s that time again. Yet another security researcher has discovered and “disclosed” that in Untangle “admins” have administrator privileges. In Untangle, and in general English, “admin” is abbreviation for “administrator.” If an admin creates a new set of admin credentials (a username/password) and provides those credentials to a person, then that person now has administrator […]

Posted in Untangle | Tagged , , , , , | Comments Off on Admin is Root

4 ways to stop insider threats

Most discussions around data breaches and cybercriminal activity focus on external players like hackers. But, this is only skimming the surface regarding the multitudinous threats that organizations face today. In fact, insiders are increasingly playing a large, outsized role in many data leaks. According to the 2016 Data Breach Investigations Report from Verizon, insider threats […]

Posted in Untangle | Tagged , , , , , , , | Comments Off on 4 ways to stop insider threats