5 Ways to Strengthen your Password

We use passwords to secure a variety of personal and professional accounts. These accounts protect important data such as ourbanking information, medical portals, or company emails. As we create more profiles for different business and life-critical applications, ensuring that each password is secure, complex, and memorable enough is an essential part of combating cyber criminals. […]

Posted in Untangle | Tagged , , , , , | Comments Off on 5 Ways to Strengthen your Password

Securing Your Network in Preparation for the Holidays

The holiday shopping season is upon us. Kicking off with Small Business Saturday – a chance for customers to explore local or regional small businesses, and continuing throughout the month of December. With the increase in internet traffic to business sites during this busy time, small businesses should think beyond their inventory. Arranging for plenty […]

Posted in Untangle | Tagged , , , , , , , , | Comments Off on Securing Your Network in Preparation for the Holidays

The Cost of Ransomware Attacks on Cities

Ransomware attacks on cities are becoming more prevalent with ransom demands increasing with each attack. Recently, two cities have gone against conventional wisdom and decided to pay the ransom amount demanded by hackers who held their cities hostage. This decision has kickstarted the conversation between groups debating the moral implications of giving in to cybercriminals […]

Posted in Untangle | Tagged , , , , , , , , , , | Comments Off on The Cost of Ransomware Attacks on Cities

A Family Affair: Protecting Your Home Networks & Devices

There has been an enormous increase in attacks on mobile and IoT devices in recent years. In 2018, one third of all attacks targeted mobile devices, and IoT attacks grew 600% between 2016 and 2017. While these attacks are not new news for businesses, they are now impacting home and personal users who do not […]

Posted in Untangle | Tagged , , , , , , , , , , | Comments Off on A Family Affair: Protecting Your Home Networks & Devices

Security is Everyone’s Responsibility in the Organization

The days when security was only the IT department’s headache are long gone. Today, everyone in an organization has to take personal responsibility for security and network safety. A big reason is the transformation in the modern workplace. In the past, IT departments had strict control over gateways, firewalls, and networks. With the advent of […]

Posted in Untangle | Tagged , , , , , , , , , , , , | Comments Off on Security is Everyone’s Responsibility in the Organization

Safeguarding the Nation’s Critical Infrastructure

The resilience of critical infrastructure is a key factor in the security of any nation. The US security infrastructure has sixteen sectors whose assets, systems, and networks influence food supply, water, financial services, public health, power and more. Previously, cybercriminals used to ignore local sectors like state/municipal governments and first responders to go after larger […]

Posted in Untangle | Tagged , , , , , , , , , , | Comments Off on Safeguarding the Nation’s Critical Infrastructure

3 Ways to Attempt BYOD and IoT Security

A decade ago, when smartphones started to penetrate the corporate world, IT managers had to consider the implications of Bring Your Own Device (BYOD) for their organization’s security. Now the proliferation of the Internet of Things (IoT) or connected devices has added an additional layer of complexity. Organizations are trying to keep pace with the […]

Posted in Untangle | Tagged , , , , , , , , | Comments Off on 3 Ways to Attempt BYOD and IoT Security

Network Security Entering No-Content Era

Firewalls have changed a great deal over the past 20 years. Originally, firewalls were just a simple set of rules to do packet filtering. Though they were not designed to deal with many of the problems that came later, firewalls are still a useful and necessary tool in the security arsenal. Soon administrators needed to […]

Posted in Untangle | Tagged , , , , , , , , , , , , , , , | Comments Off on Network Security Entering No-Content Era