Tag: network security
Modern enterprises cannot rely on VPNs anymore
Is your company depending on VPNs to access documents, files, and applications remotely? Unfortunately, legacy VPN products no longer meet the security requirements of today’s global enterprise. Many employees often proactively install commercial VPNs that are not provided or sanctioned by...
IoT is exposing networks to cybersecurity vulnerabilities
Businesses that have been fortifying their computers against ransomware and other threats could be overlooking additional vulnerabilities within their ecosystem. While the office computers may be as secure as Fort Knox, IoT devices such as the copier, scanner, digital signage,...
Seven key ways to defend a network from fatal DDoS attacks
Distributed Denial of Service Attacks (DDoS) are much different than what they used to be. In the past, DDoS attacks involved sending as much traffic and data as possible to a network or server, with the idea of overwhelming it...
Barracuda CloudGen Firewall’s work-from-home capabilities
Barracuda solutions have long been engineered to support distributed workloads and mobile workforces. We fully embraced the changing nature of work a few years ago when we launched our Barracuda CloudGen Firewall (CGF). The Barracuda CGF took firewalls to the...
MSP provides comprehensive network and email security
NoctisIT has been serving the Austin, Texas area since 2013, providing technical help desk support, computer support, and consulting services to small and mid-size businesses. The service provider’s security expertise has contributed to its demand, not only in protecting highly...
Are IoT devices serious security threats?
IoT is transforming offices, campuses, and factories, but also brings warnings that the cloud-connected security camera monitoring the storage room could be a threat. How realistic are these warnings, and how much is hyperbole? For answers, Smarter MSP checked in...
When throttling is acceptable
I have previously written about how important it is to be flexible with customers, allowing the occasional traffic burst to go unnoticed – well, at least as far as the invoice is concerned. The problem is when that traffic burst...
MSPs are being used to breach their customers’ networks
Hackers will probe for whatever weak links they can find to breach an enterprise’s network. However, what if the weak link is you, the MSP? The scenario of an MSP as system’s victim instead of the protector is increasingly playing...
The healthcare slice of the MSP pie continues to grow
For the second year in a row, the top security niche that MSPs are focusing in on, is the healthcare industry. As hospitals expand and medical wearables are becoming more common, organizations with skeletal IT staffs are looking more and...