Subscribe to our blog!

Geo-IP Filtering
Next-Gen Geo-IP Filtering
0 Comments

Financial Service Organizations: Why Your Firewall Isn't Enough

Jun 29, 2016

Category: cybersecurity, Financial Services

Financial organizations experienced a 40 percent increase in cybercrime over the past year, with 63 percent of companies reporting daily or weekly attacks. Firewalls and other preventive cybersecurity measures take up 80 percent of your network security budget, but these solutions don't keep up with zero-day attacks and sophisticated hackers. You face many threats your firewall isn't capable of ...

View Post
0 Comments

Key Network Security Challenges Faced by Financial Services and How to Solve Them

Jun 27, 2016

Category: cybersecurity, Financial Services

Financial services institutions are a primary target of cybercriminals, with valuable data and complex infrastructure creating an irresistible target for many intruders. Additionally, this industry suffers from the largest losses due to attacks, with an average cost of $13.5 million. Reputation damage from data breaches is another significant concern for 34 percent of financial services ...

View Post
0 Comments

How Advanced IP Filtering is Transforming Healthcare Security

Jun 21, 2016

Category: HealthCare, cybersecurity

Healthcare networks are a prime target for cybercrime. The life-saving services, data and business operations included in the healthcare model have also become quite the lucrative target for cybercriminals.

View Post
0 Comments

Higher Ed: Network Security Challenges + How to Fix Them

Jun 13, 2016

Category: education

At today’s colleges and universities, the campus network supports a growing number of research, communications, and educational functions. But with thousands of users, endpoints, and applications active at any time, campus networks are becoming increasingly difficult to protect. Academic IT professionals are constantly challenged to ensure that all devices logging onto the network are secure, to ...

View Post
0 Comments

Industrial Control System Attacks: A Very Real Threat

May 10, 2016

Category: cybersecurity

According to a report released this year by the Industrial Control Systems Cybersecurity Emergency Response Team (ICS-CERT), the number of network security attacks on industrial control systems in the United States rose by 20 percent in 2015. Security attacks on the nation's critical infrastructure should no longer be considered just a possibility or something that happens only in the movies. The ...

View Post
0 Comments

How Schools Are Being Used as Phishing Attack Platforms

May 3, 2016

Category: education

Schools employ many types of technology to improve the quality of education. On the surface, these technologies are helpful solutions. However, there is a commonly under-addressed concern: major cyber security vulnerabilities.

View Post
0 Comments

Attending Interop? How to Make the Most of Your Attendance

Apr 28, 2016

Category: Industry Events & Conferences

By Frank Trama Headed to Vegas next week for Interop ? If so, you can certainly expect an exciting, fast-paced, and deeply informative experience. That said, industry events such as Interop can be overwhelming, as there is so much to accomplish in just a few short days. I’m sure you can relate: at the beginning of the conference, it seems as if your time is unlimited, but before you know it, you ...

View Post
0 Comments

Unaddressed Cybersecurity Concerns of Small Businesses

Apr 27, 2016

Category: cybersecurity, Small Business

Security is a major concern for all types of businesses. However, it is not uncommon for small businesses to have a number of unaddressed security issues in their environment. Unfortunately, small businesses face enterprise level security risks, without the budget. Let's take a look at a few vulnerabilities that could affect your small business and how you can address them.

View Post
0 Comments

How Spammers Use Colocation Facilities to Get To You

Apr 20, 2016

Category: cybersecurity

Colocation facilities can be a controversial subject. They provide reliable hosting for companies that can't afford or don't want to invest in their own server, but spammers can also use them to get around the traditional Geo-IP filters that protect companies and individuals from spam. As a network security administrator, you need to understand how spammers abuse colocation facilities so you can ...

View Post
0 Comments

Ransomware: How Snail Mail and Low Demands Could Mean Big Losses for Healthcare

Apr 18, 2016

Category: HealthCare

A healthcare employee opens an email that looks important and clicks on the link. He goes about his day, only to return to see a message on his screen telling him all files on the system are now locked. Even worse, if he doesn't pay a ransom within 48 hours, those files will be deleted permanently.

View Post