Inside Untangle Blog

Read Our Latest Posts

Learn about security trends, cybersecurity news, as well as tips and tricks to keeping your network secure.

The network’s role in IoT security

The Internet of Things is one of the biggest trends in the technology world today, growing by leaps and bounds. According to Gartner, an estimated 6.4 billion connected objects will be in existence by the end of this year, and approximately 25 billion IP-connected things may be around in 2020. Should these predictions come true, […]

Is recreational traffic slowing down your network?

At most organizations, are people working hard or hardly working? If internet usage statistics are any indication, the latter is true. For starters, a 2010 report found that 10 percent of all business bandwidth is used for YouTube, while close to 7 percent of all links clicked by employees are related to Facebook. In the […]

The top 4 things that happened at DEF CON 24

DEF CON, one of the biggest hacker conventions around, was just held in early August in Las Vegas. As one of the largest gatherings of hackers and cybersecurity experts on the planet, DEF CON showcases the present and future of hacking, cybersecurity and networking. Of everything that went on over the conference, here are the four biggest things that […]

Network setup best practices: 4 protection mechanisms all networks should have

In order to help protect key information and databases, many organizations will be very particular in how they set up their network and what protection mechanisms they put in place. But how it actually occurs and what specifically is used can vary dramatically from one organization to the next. A well-organized and well-protected network should […]

Admin is Root

It’s that time again. Yet another security researcher has discovered and “disclosed” that in Untangle “admins” have administrator privileges. In Untangle, and in general English, “admin” is abbreviation for “administrator.” If an admin creates a new set of admin credentials (a username/password) and provides those credentials to a person, then that person now has administrator […]

Back-to-school tips for education networks

While it may seem like just yesterday that the bell rang on the last day of the school year, in short order the kids will be back in school for the next academic year. Summer is a time for students and teachers to relax, but not for IT administrators and staff. This period when kids […]

How to keep ransomware attacks away from backups

Since its emergence,  the numerous variants of ransomware have wreaked havoc on networks and computers worldwide. By encrypting files and not releasing them until a ransom is paid, ransomware has proven to be especially effective and lucrative for cybercriminals. Even backups are no longer safe from ransomware. But, with a little knowledge and the right […]

Sysadmins: IT Superheroes! Retweet to Win!

Everyday, sysadmins step into the line of fire to protect the common folk from viruses, malware, and hackers. While their superpowers are many, IT superheroes who are in the know have Untangle NG Firewall as their first line of defense. This month we are celebrating the selfless sysadmins who go out of their way to […]

4 ways to stop insider threats

Most discussions around data breaches and cybercriminal activity focus on external players like hackers. But, this is only skimming the surface regarding the multitudinous threats that organizations face today. In fact, insiders are increasingly playing a large, outsized role in many data leaks. According to the 2016 Data Breach Investigations Report from Verizon, insider threats […]

How to declare your independence from spam

Unlike the canned meat, which has both its supporters and detractors, spam email is loved by no one – except perhaps cybercriminals. While spam emails have been around for decades, they remain all too prevalent today. But, there are some easy ways to keep spam out of any inbox. Current state of spam The message that is […]