'Credible threat': How to protect networks from ransomware

'Credible threat': How to protect networks from ransomware

With recent warnings of ransomware attacks targeting US healthcare organizations, this 7-step plan including backup and recovery, network monitoring, and antivirus may help protect your company.

National pen test execution standard would improve network security

National pen test execution standard would improve network security

Inconsistent penetration test procedures create gaps and leave vulnerabilities open. A national test execution standard could fix that and ensure networks are equally secure.

Fight for net neutrality rules gains momentum

Fight for net neutrality rules gains momentum

The U.S. Supreme court’s refusal to remove a lower court’s decision to uphold net neutrality rules could help supporters in future legal battles if the policy is re-introduced.

How to protect your infrastructure from DNS cache poisoning

How to protect your infrastructure from DNS cache poisoning

When your company’s internet access, VoIP and email all depend on DNS, you have to ensure your DNS server is protected against DNS spoofing attacks. One solution: DNSSEC.

Prepare for the future without net neutrality

Prepare for the future without net neutrality

With the end of net neutrality, it is important for organizations to prepare for any potential changes in their internet service.

What to do if your cloud provider stops offering its services

What to do if your cloud provider stops offering its services

Any cloud provider can go out of business or stop offering it services, so it is critical to have a contingency plan in place if it happens.

Secure your SDN controller

Secure your SDN controller

Security is one of the biggest challenges facing software-defined networks. To prevent unauthorized activity, it is essential that you secure your SDN controller.

Increase your network security: Deploy a honeypot

Increase your network security: Deploy a honeypot

Deploying a honeypot system on your internal network is a proactive measure that enables you to immediately detect an intruder before any data is damaged or stolen.

Always test remote app performance with a WAN emulator

Always test remote app performance with a WAN emulator

When you test new applications using a WAN emulator before deployment, you ensure apps perform to remote users’ standards and requirements.

Is protected health information safe in the cloud?

Is protected health information safe in the cloud?

More healthcare providers are storing protected health information (PHI) in the cloud, and certain actions must be taken to secure it.

How to protect your data when using public Wi-Fi

How to protect your data when using public Wi-Fi

Hackers love public Wi-Fi. Unsuspecting victims often fall into their traps. To protect your data when using public Wi-Fi, follow these four steps.

How to protect against cross-site request forgery attacks

How to protect against cross-site request forgery attacks

Cross-site request forgery (CSRF) attacks are becoming more sophisticated, but there are many ways you can prevent them.

Internet VPN or MPLS for branch office IP phone communication?

Internet VPN or MPLS for branch office IP phone communication?

Before you choose internet VPN or MPLS for branch office IP phone communication, do a cost-benefit analysis.

Encryption critical for protecting mobile device data

More and more personal data is being stored on mobile devices, and without encryption, this data can easily fall into the wrong hands.