A Family Affair: Protecting Your Home Networks & Devices

There has been an enormous increase in attacks on mobile and IoT devices in recent years. In 2018, one third of all attacks targeted mobile devices, and IoT attacks grew 600% between 2016 and 2017. While these attacks are not new news for businesses, they are now impacting home and personal users who do not […]

Posted in Inside Untangle Blog | Tagged , , , , , , , , , , | Comments Off on A Family Affair: Protecting Your Home Networks & Devices

3 Ways to Attempt BYOD and IoT Security

A decade ago, when smartphones started to penetrate the corporate world, IT managers had to consider the implications of Bring Your Own Device (BYOD) for their organization’s security. Now the proliferation of the Internet of Things (IoT) or connected devices has added an additional layer of complexity. Organizations are trying to keep pace with the […]

Posted in Inside Untangle Blog | Tagged , , , , , , , , | Comments Off on 3 Ways to Attempt BYOD and IoT Security

What should school districts know about CIPA compliance?

Technological advancements including mobile devices, intelligent software and other learning tools are changing the way educators teach and shifting the way students participate in their own education. As institutions continue to add more innovative endpoints and platforms, it’s important that they also consider the requirements of the Children’s Internet Protection Act. CIPA is critical for […]

Posted in Inside Untangle Blog | Tagged , , , , , , , | Comments Off on What should school districts know about CIPA compliance?

The network’s role in IoT security

The Internet of Things is one of the biggest trends in the technology world today, growing by leaps and bounds. According to Gartner, an estimated 6.4 billion connected objects will be in existence by the end of this year, and approximately 25 billion IP-connected things may be around in 2020. Should these predictions come true, […]

Posted in Inside Untangle Blog | Tagged , , , , | Comments Off on The network’s role in IoT security

Network Setup 4 Best Practices

In order to help protect key information and databases, many organizations will be very particular in how they set up their network and what protection mechanisms they put in place. But how it actually occurs and what specifically is used can vary dramatically from one organization to the next. A well-organized and well-protected network should […]

Posted in Inside Untangle Blog | Tagged , , , , , | Comments Off on Network Setup 4 Best Practices

Admin is Root

It’s that time again. Yet another security researcher has discovered and “disclosed” that in Untangle “admins” have administrator privileges. In Untangle, and in general English, “admin” is abbreviation for “administrator.” If an admin creates a new set of admin credentials (a username/password) and provides those credentials to a person, then that person now has administrator […]

Posted in Inside Untangle Blog | Tagged , , , , , | Comments Off on Admin is Root