Is recreational traffic slowing down your network?

At most organizations, are people working hard or hardly working? If internet usage statistics are any indication, the latter is true. For starters, a 2010 report found that 10 percent of all business bandwidth is used for YouTube, while close to 7 percent of all links clicked by employees are related to Facebook. In the […]

Posted in Inside Untangle Blog | Tagged , , , , , , | Comments Off on Is recreational traffic slowing down your network?

Network Setup 4 Best Practices

In order to help protect key information and databases, many organizations will be very particular in how they set up their network and what protection mechanisms they put in place. But how it actually occurs and what specifically is used can vary dramatically from one organization to the next. A well-organized and well-protected network should […]

Posted in Inside Untangle Blog | Tagged , , , , , | Comments Off on Network Setup 4 Best Practices

Admin is Root

It’s that time again. Yet another security researcher has discovered and “disclosed” that in Untangle “admins” have administrator privileges. In Untangle, and in general English, “admin” is abbreviation for “administrator.” If an admin creates a new set of admin credentials (a username/password) and provides those credentials to a person, then that person now has administrator […]

Posted in Inside Untangle Blog | Tagged , , , , , | Comments Off on Admin is Root

4 ways to stop insider threats

Most discussions around data breaches and cybercriminal activity focus on external players like hackers. But, this is only skimming the surface regarding the multitudinous threats that organizations face today. In fact, insiders are increasingly playing a large, outsized role in many data leaks. According to the 2016 Data Breach Investigations Report from Verizon, insider threats […]

Posted in Inside Untangle Blog | Tagged , , , , , , , | Comments Off on 4 ways to stop insider threats