The Cost of Ransomware Attacks on Cities

Ransomware attacks on cities are becoming more prevalent with ransom demands increasing with each attack. Recently, two cities have gone against conventional wisdom and decided to pay the ransom amount demanded by hackers who held their cities hostage. This decision has kickstarted the conversation between groups debating the moral implications of giving in to cybercriminals […]

Posted in Inside Untangle Blog | Tagged , , , , , , , , , , | Comments Off on The Cost of Ransomware Attacks on Cities

A Family Affair: Protecting Your Home Networks & Devices

There has been an enormous increase in attacks on mobile and IoT devices in recent years. In 2018, one third of all attacks targeted mobile devices, and IoT attacks grew 600% between 2016 and 2017. While these attacks are not new news for businesses, they are now impacting home and personal users who do not […]

Posted in Inside Untangle Blog | Tagged , , , , , , , , , , | Comments Off on A Family Affair: Protecting Your Home Networks & Devices

Security is Everyone’s Responsibility in the Organization

The days when security was only the IT department’s headache are long gone. Today, everyone in an organization has to take personal responsibility for security and network safety. A big reason is the transformation in the modern workplace. In the past, IT departments had strict control over gateways, firewalls, and networks. With the advent of […]

Posted in Inside Untangle Blog | Tagged , , , , , , , , , , , , | Comments Off on Security is Everyone’s Responsibility in the Organization

Safeguarding the Nation’s Critical Infrastructure

The resilience of critical infrastructure is a key factor in the security of any nation. The US security infrastructure has sixteen sectors whose assets, systems, and networks influence food supply, water, financial services, public health, power and more. Previously, cybercriminals used to ignore local sectors like state/municipal governments and first responders to go after larger […]

Posted in Inside Untangle Blog | Tagged , , , , , , , , , , | Comments Off on Safeguarding the Nation’s Critical Infrastructure

3 Ways to Attempt BYOD and IoT Security

A decade ago, when smartphones started to penetrate the corporate world, IT managers had to consider the implications of Bring Your Own Device (BYOD) for their organization’s security. Now the proliferation of the Internet of Things (IoT) or connected devices has added an additional layer of complexity. Organizations are trying to keep pace with the […]

Posted in Inside Untangle Blog | Tagged , , , , , , , , | Comments Off on 3 Ways to Attempt BYOD and IoT Security

Network Security Entering No-Content Era

Firewalls have changed a great deal over the past 20 years. Originally, firewalls were just a simple set of rules to do packet filtering. Though they were not designed to deal with many of the problems that came later, firewalls are still a useful and necessary tool in the security arsenal. Soon administrators needed to […]

Posted in Inside Untangle Blog | Tagged , , , , , , , , , , , , , , , | Comments Off on Network Security Entering No-Content Era