Inside Untangle Blog

Lessons learned from the Bangladesh Bank hack

In early 2016, a major hack made waves throughout the banking world when news emerged that cybercriminals made off with around $81 million by sending over fraudulent money transfer requests through the SWIFT financial network. By unpacking what happened to Bangladesh Bank, organizations can get a better sense of the threats they are currently facing […]

12 IT Tips for the Holidays Breakdown – Thank You!

Thank you everyone for participating in the 12 IT Tips for the Holidays Sweepstakes. We hope these tips helped raise network security awareness in your organization. In case you missed the tips or want additional clarity on each, we offer a little more guidance: Fully secure Internet traffic with SSL Inspection. As network traffic shifts […]

12 IT Tips for the Holidays – Retweet to Win!

Network security is no joking matter. With threats looming from all angles – viruses, malware, trojans, and inside attacks – network administrators are working hard to protect your organization’s infrastructure. Untangle wants to give those network administrators a hand by providing 12 IT Tips they and all employees can use to ensure everyone is doing […]

The Ad Blocking Debate

To block or not to block. That is the question percolating everywhere from tech pubs to social media. While the topic has been up for discussion for quite some time, with Apple’s recent stance on blocking ads, the debate is now front and center. Users who block ads, or want the ability to block ads, […]

Is SMB ready for the Cloud?

2015 will be a big year for Microsoft and for the small-and-medium businesses who rely on their products. Back in July, 2012, Microsoft announced the end of development of their hugely popular Small Business Server, much to the chagrin of many of the SMB faithful who relied on this stalwart that has long-dominated in companies […]

4 Ways Nonprofits Can Stretch Their IT Dollars

Nonprofits are challenged by all of the same IT concerns as their counterparts at for-profit companies – but often, they also have to contend with tighter budgets and a level of scrutiny that comes from responsibilities to their donors and their mission. We’ve identified four ways to help those hard-won IT budgets go a bit […]

Protecting Yourself Against Phishing Scams

Spammers and malware distributors are always coming up with new ways to fool the unsuspecting. There are a few reasons that they send you “phishing” emails: They want to ascertain whether or not the email address is valid and/or whether or not someone actually reads it. The address can then be sold to other spammers. […]

Shellshock: What You Need to Know

Here we go again. As network attacks continue to rise, more and more exploits are being found. Not so long ago there was Heartbleed, which was terrible in its own right, but now Shellshock (CVE-2014-6271, CVE-2014-7169) has been found and it is much worse. Yes, apparently even The Shredder is attacking networks now. So what […]

How to Bypass Web Content Filters

Ahh the Internet, chock full of all kinds of content. Text, images, sounds, videos. Even though an inordinate amount of that content contains cats for some reason, there is still a whole lot to see, hear and interact with. There is certainly content that is inappropriate for specific ages and in specific environments, and content […]

Heartbleed: What You Need to Know

Most of the time when you hear the “heart” paired with anything but the word “beat” it’s bad.  Heart ache, heart attack, heart burn, open heart surgery, you get the idea. However the Heartbleed bug that affected approximately two-thirds of the Internet’s web servers isn’t bad, it’s much worse. The bug appears to be over […]