Inside Untangle Blog

Read Our Latest Posts

Learn about security trends, cybersecurity news, as well as tips and tricks to keeping your network secure.

The most effective firewall features to use

Firewalls have long been part of an effective network monitoring and protection scheme, and that remains the case still today. But, not all firewalls are as effective as others, and each one has its upsides and downsides for every organization. Here are four firewall features to consider: 1) Geolocation by IP This filter works by […]

What is the future of SSL?

As a way to encrypt and thus keep web traffic away from prying eyes, the Secure Sockets Layer protocol has been the go-to option for e-commerce firms and others on the internet for many years now. But, as cybercriminals continue to find holes in SSL and as issues with the underpinning technology arise, its future […]

Lessons learned from the Bangladesh Bank hack

In early 2016, a major hack made waves throughout the banking world when news emerged that cybercriminals made off with around $81 million by sending over fraudulent money transfer requests through the SWIFT financial network. By unpacking what happened to Bangladesh Bank, organizations can get a better sense of the threats they are currently facing […]

12 IT Tips for the Holidays Breakdown – Thank You!

Thank you everyone for participating in the 12 IT Tips for the Holidays Sweepstakes. We hope these tips helped raise network security awareness in your organization. In case you missed the tips or want additional clarity on each, we offer a little more guidance: Fully secure Internet traffic with SSL Inspection. As network traffic shifts […]

12 IT Tips for the Holidays – Retweet to Win!

Network security is no joking matter. With threats looming from all angles – viruses, malware, trojans, and inside attacks – network administrators are working hard to protect your organization’s infrastructure. Untangle wants to give those network administrators a hand by providing 12 IT Tips they and all employees can use to ensure everyone is doing […]

The Ad Blocking Debate

To block or not to block. That is the question percolating everywhere from tech pubs to social media. While the topic has been up for discussion for quite some time, with Apple’s recent stance on blocking ads, the debate is now front and center. Users who block ads, or want the ability to block ads, […]

Is SMB ready for the Cloud?

2015 will be a big year for Microsoft and for the small-and-medium businesses who rely on their products. Back in July, 2012, Microsoft announced the end of development of their hugely popular Small Business Server, much to the chagrin of many of the SMB faithful who relied on this stalwart that has long-dominated in companies […]

4 Ways Nonprofits Can Stretch Their IT Dollars

Nonprofits are challenged by all of the same IT concerns as their counterparts at for-profit companies – but often, they also have to contend with tighter budgets and a level of scrutiny that comes from responsibilities to their donors and their mission. We’ve identified four ways to help those hard-won IT budgets go a bit […]

Protecting Yourself Against Phishing Scams

Spammers and malware distributors are always coming up with new ways to fool the unsuspecting. There are a few reasons that they send you “phishing” emails: They want to ascertain whether or not the email address is valid and/or whether or not someone actually reads it. The address can then be sold to other spammers. […]

Shellshock: What You Need to Know

Here we go again. As network attacks continue to rise, more and more exploits are being found. Not so long ago there was Heartbleed, which was terrible in its own right, but now Shellshock (CVE-2014-6271, CVE-2014-7169) has been found and it is much worse. Yes, apparently even The Shredder is attacking networks now. So what […]