Inside Untangle Blog

Read Our Latest Posts

Learn about security trends, cybersecurity news, as well as tips and tricks to keeping your network secure.

Admin is Root

It’s that time again. Yet another security researcher has discovered and “disclosed” that in Untangle “admins” have administrator privileges. In Untangle, and in general English, “admin” is abbreviation for “administrator.” If an admin creates a new set of admin credentials (a username/password) and provides those credentials to a person, then that person now has administrator […]

Back-to-school tips for education networks

While it may seem like just yesterday that the bell rang on the last day of the school year, in short order the kids will be back in school for the next academic year. Summer is a time for students and teachers to relax, but not for IT administrators and staff. This period when kids […]

How to keep ransomware attacks away from backups

Since its emergence,  the numerous variants of ransomware have wreaked havoc on networks and computers worldwide. By encrypting files and not releasing them until a ransom is paid, ransomware has proven to be especially effective and lucrative for cybercriminals. Even backups are no longer safe from ransomware. But, with a little knowledge and the right […]

Sysadmins: IT Superheroes! Retweet to Win!

Everyday, sysadmins step into the line of fire to protect the common folk from viruses, malware, and hackers. While their superpowers are many, IT superheroes who are in the know have Untangle NG Firewall as their first line of defense. This month we are celebrating the selfless sysadmins who go out of their way to […]

4 ways to stop insider threats

Most discussions around data breaches and cybercriminal activity focus on external players like hackers. But, this is only skimming the surface regarding the multitudinous threats that organizations face today. In fact, insiders are increasingly playing a large, outsized role in many data leaks. According to the 2016 Data Breach Investigations Report from Verizon, insider threats […]

How to declare your independence from spam

Unlike the canned meat, which has both its supporters and detractors, spam email is loved by no one – except perhaps cybercriminals. While spam emails have been around for decades, they remain all too prevalent today. But, there are some easy ways to keep spam out of any inbox. Current state of spam The message that is […]

The most effective firewall features to use

Firewalls have long been part of an effective network monitoring and protection scheme, and that remains the case still today. But, not all firewalls are as effective as others, and each one has its upsides and downsides for every organization. Here are four firewall features to consider: 1) Geolocation by IP This filter works by […]

What is the future of SSL?

As a way to encrypt and thus keep web traffic away from prying eyes, the Secure Sockets Layer protocol has been the go-to option for e-commerce firms and others on the internet for many years now. But, as cybercriminals continue to find holes in SSL and as issues with the underpinning technology arise, its future […]

Lessons learned from the Bangladesh Bank hack

In early 2016, a major hack made waves throughout the banking world when news emerged that cybercriminals made off with around $81 million by sending over fraudulent money transfer requests through the SWIFT financial network. By unpacking what happened to Bangladesh Bank, organizations can get a better sense of the threats they are currently facing […]

12 IT Tips for the Holidays Breakdown – Thank You!

Thank you everyone for participating in the 12 IT Tips for the Holidays Sweepstakes. We hope these tips helped raise network security awareness in your organization. In case you missed the tips or want additional clarity on each, we offer a little more guidance: Fully secure Internet traffic with SSL Inspection. As network traffic shifts […]