Inside Untangle Blog

Read Our Latest Posts

Learn about security trends, cybersecurity news, as well as tips and tricks to keeping your network secure.

The Benefits of SD-WAN for Branch Office Connectivity

A wide-area network, or WAN, is necessary for any company that is seeking to expand or has resources separated by distance. It allows separate bra…

read more

Stay Up to Date

Sign up to receive updates on Untangle news, products and more

The Cost of Ransomware Attacks on Cities

Ransomware attacks on cities are becoming more prevalent with ransom demands increasing with each attack. Recently, two cities have gone against co…

read more

Protecting Healthcare Networks Against Threats

In today’s digitally connected world, cybersecurity is a critical concern for all industries. However, for the healthcare industry, the failure to …

read more

Why Should I Update My Firewall?

Staying up to date with your network security appliance is absolutely necessary. For the same reasons we regularly update our phones, browsers, and…

read more

A Family Affair: Protecting Your Home Networks & Devices

There has been an enormous increase in attacks on mobile and IoT devices in recent years. In 2018, one third of all attacks targeted mobile devices…

read more

Security is Everyone’s Responsibility in the Organization

The days when security was only the IT department’s headache are long gone. Today, everyone in an organization has to take personal responsibility …

read more

Safeguarding the Nation’s Critical Infrastructure

The resilience of critical infrastructure is a key factor in the security of any nation. The US security infrastructure has sixteen sectors whose a…

read more

Cybersecurity Professionals: Path to Job Security

Checking the news these days can be a scary proposition. With daily headlines about major corporate breaches, ransomware, and cryptojacking, consum…

read more

3 Ways to Attempt BYOD and IoT Security

A decade ago, when smartphones started to penetrate the corporate world, IT managers had to consider the implications of Bring Your Own Device (BYO…

read more

Network Security Entering No-Content Era

Firewalls have changed a great deal over the past 20 years. Originally, firewalls were just a simple set of rules to do packet filtering. Though th…

read more

ScoutIQ™ Stops WannaCry Ransomware Before It Reaches Networks

Global Ransomware Targeting Windows Computers Claims Thousands of Victims; Untangle’s NG Firewall with Integrated ScoutIQ Threat Intelligence Preve…

read more

Ransomware in the spotlight: How to guard against attack

Is there anything more frightening than being locked out of your most important and sensitive files? This is just the reality that a number of indi…

read more

4 Resolutions You Can Make to Secure Your Network in the New Year

2017 is almost upon us, and now is the time for IT leaders and network administrators to take a hard look at their technology resources. As this ye…

read more

What should school districts know about CIPA compliance?

Technological advancements including mobile devices, intelligent software and other learning tools are changing the way educators teach and shiftin…

read more

3 Network Horror Stories that Keep IT Up at Night

Any horror fan knows that the best – not to mention most bone-chilling – stories are always rooted in truth.

The same is true for network attack…

read more

4 Scariest Threats to your Network

It’s that time of year again: Children dress up in costume, adults adorn their houses with spooky decorations and it’s simply fun to be a little sc…

read more

Illinois Election System Breached

This election cycle has provided more than a few noteworthy headlines. Some of the most recent, however, don’t comment on the candidates, but rathe…

read more

How hospitals can get control over their sprawling networks

Hospitals are more commonly embracing digitalization and the benefits of our increasingly connected world. Whether due to pressure from government …

read more

Top 3 features that hotels need in their network security solution

Recently, there has been considerable attention surrounding the issue of network security at hotels and resorts. These networks have been notorious…

read more

School’s in session, but is your network ready?

For students, teachers, administrators and others involved in the education sector, this season means one thing: back to school. As parents make ef…

read more

What can hospitals learn from the Kansas Heart Hospital breach?

It’s a story similar to many others that have been taking place over the last few years. Employees and executives come into their place of business…

read more

4 things all nonprofits need to know about network security

Nonprofits face unique challenges when it comes to ensuring network security. Unlike many organizations in the private sector, nonprofits need to c…

read more

The network’s role in IoT security

The Internet of Things is one of the biggest trends in the technology world today, growing by leaps and bounds. According to Gartner, an estimated …

read more

Is recreational traffic slowing down your network?

At most organizations, are people working hard or hardly working? If internet usage statistics are any indication, the latter is true. For starters…

read more

Network Setup 4 Best Practices

In order to help protect key information and databases, many organizations will be very particular in how they set up their network and what protec…

read more

Admin is Root

It’s that time again. Yet another security researcher has discovered and “disclosed” that in Untangle “admins” have administrator privileges. In Un…

read more

Back-to-school tips for education networks

While it may seem like just yesterday that the bell rang on the last day of the school year, in short order the kids will be back in school for the…

read more

How to keep ransomware attacks away from backups

Since its emergence,  the numerous variants of ransomware have wreaked havoc on networks and computers worldwide. By encrypting files and not relea…

read more

4 ways to stop insider threats

Most discussions around data breaches and cybercriminal activity focus on external players like hackers. But, this is only skimming the surface reg…

read more

How to declare your independence from spam

Unlike the canned meat, which has both its supporters and detractors, spam email is loved by no one – except perhaps cybercriminals. While spam ema…

read more

The most effective firewall features to use

Firewalls have long been part of an effective network monitoring and protection scheme, and that remains the case still today. But, not all firewal…

read more

What is the future of SSL?

As a way to encrypt and thus keep web traffic away from prying eyes, the Secure Sockets Layer protocol has been the go-to option for e-commerce fir…

read more

Stay Up to Date