How to Prevent Malicious Bots and Worms from Network Scanning
Network scanning is the use of computers or other devices to gather information in order to compromise your network. Your business’ network is likely being scanned by internet worms and bots over 100 times a day. These bots and worms scan your network to help hackers find vulnerabilities and gain access to some of your […]
Network Vulnerabilities: Stay Ahead of Hackers
Majority of the time, the resolution of a mystery story is to “think like the bad guys.” In true Sherlock Holmes style, applying attention to detail while putting yourself in the shoes of the hacker helps prevent bad things from happening. Coincidentally, this strategy is particularly applicable to apply to your business’ network security. To stay […]
What are DDoS Attacks and How to Defend Your Network
You may have heard the term “DDoS” repeated in the news recently and wondered what exactly that meant. The term “DDoS” means a “Distributed Denial of Service” attack. What this means in non-technical terms is that someone is taking a large amount of compromised or vulnerable devices and directing them to send traffic to your network to […]
What is a VPN and Why Should You Be Using It?
What’s a VPN? A virtual private network, also known as a VPN, gives online users the ability to securely connect to the internet by utilizing a provider’s protected server system. Just as an armored car service wouldn’t drive away from the bank parking lot with the back door open, neither should you by transmitting sensitive […]
Firewall Protection: Why Your Old Firewall Isn’t Enough
Firewalls from five years ago are no longer enough to protect your networks. Traditional firewalls block connections into (ingress) and out (egress) of your network based on the rules that you apply to it. In a traditional sense, you would apply a rule to the access control list (ACL) and it would allow or block […]
Protecting Your Router from Hackers: Need a Reboot?
One of the most important devices in your home or business may be one that you never see or think about. In most cases, it’s the first line of defense in your network security. If it’s vulnerable, your whole network is at risk of being compromised. I’m referring to your routers and nation-state hackers are […]
Firewalls for Small Businesses: What you Need to Know
Most small businesses are aware that viruses and malware threaten their business, but the response is limited to installing antivirus software. While this software recognizes and quarantines infections, it doesn’t prevent viruses and malware from reaching employee devices. A firewall is a much better first line of defense that proactively blocks attacks. In this article, we will […]
Guide to Securing Your Business’s Network from Attacks
Imagine that a someone walks into your small business office, sits down at an unlocked computer and starts downloading files onto a USB thumb drive. You would probably immediately unplug the thumb drive and call the police! The reality is that criminals are showing up at thousands of small businesses every day to do the […]
Does Your Network Have These 3 Common Security Holes?
Imagine that you’re installing a new building security system, but you’re not sure how it all works, so you just screw the keypads onto the door and assume you’re protected. Or, maybe you changed the default keypad code to the four digit address of your building to make it easy to remember. Very few business […]
4 Signs That Your Network May Have Been Hacked
More than half of all small to mid-sized businesses have been hacked at some point, according to Hartford Steam Boiler, and three-quarters weren’t able to restore all of the lost data. The average company takes more than 200 days to detect a data breach, according to Ponemon Institute, which adds millions of dollars to the average […]