Top 3 features that hotels need in their network security solution

Recently, there has been considerable attention surrounding the issue of network security at hotels and resorts. These networks have been notoriously insecure, particularly in the eyes of travelers who have heard horror stories about public, unprotected Wi-Fi at hospitality institutions. Now, however, it’s time for this industry to do better. Many decision-makers are seeking solutions […]

Posted in Inside Untangle Blog | Tagged , , , , , , | Comments Off on Top 3 features that hotels need in their network security solution

What can hospitals learn from the Kansas Heart Hospital breach?

It’s a story similar to many others that have been taking place over the last few years. Employees and executives come into their place of business like any other day, only to realize that the critical data they need to do their jobs is locked away under the watchful eyes of cybercriminal encryption. Kansas Heart […]

Posted in Inside Untangle Blog | Tagged , , , , , , | Comments Off on What can hospitals learn from the Kansas Heart Hospital breach?

4 ways to stop insider threats

Most discussions around data breaches and cybercriminal activity focus on external players like hackers. But, this is only skimming the surface regarding the multitudinous threats that organizations face today. In fact, insiders are increasingly playing a large, outsized role in many data leaks. According to the 2016 Data Breach Investigations Report from Verizon, insider threats […]

Posted in Inside Untangle Blog | Tagged , , , , , , , | Comments Off on 4 ways to stop insider threats