Subscribe to our blog!

Geo-IP Filtering
Next-Gen Geo-IP Filtering
0 Comments

Industrial Control System Attacks: A Very Real Threat

May 10, 2016

Category: cybersecurity

According to a report released this year by the Industrial Control Systems Cybersecurity Emergency Response Team (ICS-CERT), the number of network security attacks on industrial control systems in the United States rose by 20 percent in 2015. Security attacks on the nation's critical infrastructure should no longer be considered just a possibility or something that happens only in the movies. The ...

View Post
0 Comments

How Schools Are Being Used as Phishing Attack Platforms

May 3, 2016

Category: education

Schools employ many types of technology to improve the quality of education. On the surface, these technologies are helpful solutions. However, there is a commonly under-addressed concern: major cyber security vulnerabilities.

View Post
0 Comments

Attending Interop? How to Make the Most of Your Attendance

Apr 28, 2016

Category: Industry Events & Conferences

By Frank Trama Headed to Vegas next week for Interop ? If so, you can certainly expect an exciting, fast-paced, and deeply informative experience. That said, industry events such as Interop can be overwhelming, as there is so much to accomplish in just a few short days. I’m sure you can relate: at the beginning of the conference, it seems as if your time is unlimited, but before you know it, you ...

View Post
0 Comments

Unaddressed Cybersecurity Concerns of Small Businesses

Apr 27, 2016

Category: cybersecurity, Small Business

Security is a major concern for all types of businesses. However, it is not uncommon for small businesses to have a number of unaddressed security issues in their environment. Unfortunately, small businesses face enterprise level security risks, without the budget. Let's take a look at a few vulnerabilities that could affect your small business and how you can address them.

View Post
0 Comments

How Spammers Use Colocation Facilities to Get To You

Apr 20, 2016

Category: cybersecurity

Colocation facilities can be a controversial subject. They provide reliable hosting for companies that can't afford or don't want to invest in their own server, but spammers can also use them to get around the traditional Geo-IP filters that protect companies and individuals from spam. As a network security administrator, you need to understand how spammers abuse colocation facilities so you can ...

View Post
0 Comments

Ransomware: How Snail Mail and Low Demands Could Mean Big Losses for Healthcare

Apr 18, 2016

Category: HealthCare

A healthcare employee opens an email that looks important and clicks on the link. He goes about his day, only to return to see a message on his screen telling him all files on the system are now locked. Even worse, if he doesn't pay a ransom within 48 hours, those files will be deleted permanently.

View Post
0 Comments

The Opportunities and Dangers of High-Tech Health Care

Apr 15, 2016

Category: HealthCare

Did you know that a revolution is taking place in healthcare? Institutions are connecting up all their equipment to improve communication and speed up the delivery of results to patients and doctors. Although increasing connectivity improves the patient experience, it also presents security risks because there are more points in your network where a hacker can potentially gain access to steal ...

View Post
0 Comments

Blinded By Logging Alerts? Here's How to See Again

Apr 13, 2016

Category: cybersecurity

The ability to log network traffic is a huge benefit to network security administrators. Logging systems allow admins to view and analyze activity on their networks, which means they can quickly identify security threats and take action to neutralize them. If you need to protect your network from external threats, then logging and alerts could help you achieve your goal, but you need to use these ...

View Post
0 Comments

How Next-Gen Geo-IP Filtering is Helping Healthcare Institutions Increase Security

Apr 11, 2016

Category: HealthCare

Today’s healthcare institutions are facing tremendous challenges as they continue to adopt the latest technologies in patient management and care. One of the key issues included in this new set of technology challenges is the issue of security. Maintaining patient and employee privacy, as millions of sensitive data points now exist on servers and in the cloud, becomes paramount. Also, preventing ...

View Post
0 Comments

Threat Monitoring Isn’t A Cure-All-Fix-All

Apr 7, 2016

Category: cybersecurity, Threat Detection

Threat Detection services and systems are a lot like an antivirus program. How so? It's built on the history of what we know, and to some degree provides a “good guess” of what potential some traffic may accomplish. This is also known as false-positives. So does it protect you from all harm to your network, allowing you to work worry-free? Absolutely not. If you think about this concept, threat ...

View Post