National pen test execution standard would improve network security

National pen test execution standard would improve network security

Inconsistent penetration test procedures create gaps and leave vulnerabilities open. A national test execution standard could fix that and ensure networks are equally secure.

02/01/2019

Fight for net neutrality rules gains momentum

Fight for net neutrality rules gains momentum

The U.S. Supreme court’s refusal to remove a lower court’s decision to uphold net neutrality rules could help supporters in future legal battles if the policy is re-introduced.

11/06/2018

How to protect your infrastructure from DNS cache poisoning

How to protect your infrastructure from DNS cache poisoning

When your company’s internet access, VoIP and email all depend on DNS, you have to ensure your DNS server is protected against DNS spoofing attacks. One solution: DNSSEC.

08/16/2018

Prepare for the future without net neutrality

Prepare for the future without net neutrality

With the end of net neutrality, it is important for organizations to prepare for any potential changes in their internet service.

06/19/2018

What to do if your cloud provider stops offering its services

What to do if your cloud provider stops offering its services

Any cloud provider can go out of business or stop offering it services, so it is critical to have a contingency plan in place if it happens.

03/16/2018

Secure your SDN controller

Secure your SDN controller

Security is one of the biggest challenges facing software-defined networks. To prevent unauthorized activity, it is essential that you secure your SDN controller.

01/02/2018

Increase your network security: Deploy a honeypot

Increase your network security: Deploy a honeypot

Deploying a honeypot system on your internal network is a proactive measure that enables you to immediately detect an intruder before any data is damaged or stolen.

10/24/2017

Always test remote app performance with a WAN emulator

Always test remote app performance with a WAN emulator

When you test new applications using a WAN emulator before deployment, you ensure apps perform to remote users’ standards and requirements.

09/19/2017

How to protect your network from ransomware attacks

How to protect your network from ransomware attacks

This 7-step plan, which includes backup and recovery, network monitoring, and antivirus, will help prevent a ransomware attack on your company.

08/23/2017

4 steps to planning a migration from IPv4 to IPv6

4 steps to planning a migration from IPv4 to IPv6

Waiting to address IPv6 carries a risk of lost communication, revenue and customers.

08/08/2017

Time to consider a move to IPv6

Time to consider a move to IPv6

The growth of the IoT means organizations need to start considering migrating to IPv6. Failing to migrate will restrict their ability to be flexible and innovative.

06/26/2017

Is protected health information safe in the cloud?

Is protected health information safe in the cloud?

More healthcare providers are storing protected health information (PHI) in the cloud, and certain actions must be taken to secure it.

05/18/2017

How to protect your data when using public Wi-Fi

How to protect your data when using public Wi-Fi

Hackers love public Wi-Fi. Unsuspecting victims often fall into their traps. To protect your data when using public Wi-Fi, follow these four steps.

05/03/2017

How to protect against cross-site request forgery attacks

How to protect against cross-site request forgery attacks

Cross-site request forgery (CSRF) attacks are becoming more sophisticated, but there are many ways you can prevent them.

04/18/2017

Internet VPN or MPLS for branch office IP phone communication?

Internet VPN or MPLS for branch office IP phone communication?

Before you choose internet VPN or MPLS for branch office IP phone communication, do a cost-benefit analysis.

04/10/2017

Encryption critical for protecting mobile device data

Encryption critical for protecting mobile device data

More and more personal data is being stored on mobile devices, and without encryption, this data can easily fall into the wrong hands.

04/03/2017

Load More