You are currently viewing all posts published under NetSec
Securing the Office Printer in Six Steps
Never overlook the importance of securing the office printer. How easy is it for server intrusion to occur this way? Christian Slater makes it look effortless.Read more
Step One of Ransomware Removal: Educate Your Users
Step one to ransomware removal? Don’t fall victim in the first place. That starts with education users. Not to be glib about it, but any security expert will tell you the weakest point in any network sits behind the keyboard. If you’ve succumb to a ransomware attack, do not worry and more importantly, do not pay the ransom. There are plenty of ransomware removal tools that will help you out of this jam.Read more
Ransomware Protection is as Easy as 3-2-1
Hackers are pretty clever. They design ransomware that is backwards-engineered from popular AV software coding so it flies under the radar through your network. First they use a bit of smooth social engineering to slip into an inbox. From there he sends out the ransomware in a company e-mail, mimicking a trusted coworker sending a file. When opened it, the malware exploits weak Java code en route to encrypting web and application servers.Read more
Free Antivirus Won’t Cut It for a Business
Small businesses and startups sometimes opt for using free, personal-use antivirus programs like Microsoft Windows Defender, Comodo are putting their customers at risk.Read more
[Infographic] Comparing Information Security in Large and Small Companies
How does company size dictate information security posture? A NeweggBusiness customer survey reveals differences in how companies large and small approach cybersecurity. Some findings fell ...Read more
How to Set Up Free Anti-Phishing User Training
Repeat the mantra: What is the biggest network security liability at any organization? The user! Security experts time and again emphasize how educating users with ...Read more
NGFW: Looking Behind the Dell SonicWALL
Once a business network grows beyond 10 or 20 endpoints, network security experts recommend adding a dedicated firewall security appliance—typically a Unified Threat Management Device ...Read more
Is It Art, or a USB Security Nightmare?
Did you find a random USB thumb drive lying around? Go ahead and plug it into your laptop. Better yet, use it with your work ...Read more
2016 Guide to Data Protection for a Growing SMB
Data protection measures are a non-negotiable for any business. A data breach can cost a company of any size a significant financial sum and damage ...Read more
8 in 10 SMBs Don’t Have an Incident Response Plan—Do You?
A recent survey reveals a surprising number of small businesses are unprepared for cyber criminals. Almost eight in 10 small business owners (79 percent) do ...Read more
IT Security Myths You Need to Stop Believing
Grizzled IT industry veterans have heard it all when it comes to crackpot ideas about personal and business network security. Unfortunately, these IT security myths ...Read more
Windows 10 Security: Beyond Windows Defender
Windows 10 comes pre-installed with Windows Defender antivirus, which users who upgrade from Windows 8.1 will find familiar. The built-in antivirus does a fair enough ...Read more
Are You Ready for Machines to Control The Internet Of Things?
As the Internet of Things (IoT) flourishes, billions of devices will swarm the Internet and collect data on each of us, what we do, the ...Read more
What Does the Internet of Things Mean for Our Privacy?
Those cool new watches that will connect to smartphones are part of the Internet of Things (IoT), but how many of us have considered what ...Read more
Cloud Computing Is Riskier Than Organizations Realize
Public cloud computing risks have quietly slipped into the enterprise and we are only just learning of the magnitude of the vulnerabilities. There are of ...Read more