Tag: Network devices
August 16, 2022 |
What Network Security Is and How to Fortify It
Cybersecurity threats are greater than ever. For example, the world has suffered a 645% increase in distributed denial-of-service (DDoS) attacks QoQ in March 2022, and a rise in ransomware equal to the past five years combined. Incidents like the SolarWinds hack of 2020 demonstrate that threats...
August 4, 2022 |
Open Port Vulnerabilities List
Insufficiently protected open ports can put your IT environment at serious risk. Threat actors often seek to exploit open ports and their applications through spoofing, credential sniffing and other techniques. For example, in 2017, cybercriminals spread WannaCry ransomware by exploiting an SMB...
October 1, 2019 |
Basics of Cisco Router Configuration
To start up a new Cisco LAN switch, all you have to do is plug in the Ethernet cables and power on the switch. However, you need to perform some basic Cisco router configuration before the basic router will start routing packets. In particular, the router needs to be told what interfaces (and which...
June 20, 2019 |
Map Network Drives or Shared Folders Using Group Policy in 8 Easy Steps
Mapping network drives is a common task for system administrators. One option is to create a batch script that runs every time the workstation starts. But there is a simpler and more convenient method: using Group Policy. Mapping network drives via Group Policy is faster and easier, so it is a much...
February 21, 2019 |
Why Native Network Device Auditing Is Not Enough
In one of my previous blog posts, I shared the top issues that network device auditing can help you solve. Among them are controlling device configuration, detecting unauthorized actions and thwarting scanning threats. In short, I argue that to keep your network infrastructure secure and ensure...
January 29, 2019 |
Why Monitoring of Network Devices Is Critical for Network Security
A secure network infrastructure is critical for organizations, and that requires keeping close track of what’s going on with routers, switches and other network devices. You need to be able to quickly detect and investigate threats to your perimeter security, such as unauthorized changes to...
January 22, 2019 |
The Most Common Types of Network Security Devices to Protect against External Attacks
On top of the many network devices that any enterprise should have today, there are a selection of network security tools and devices that can help you defend your network. While networking security tools have traditionally been implemented as on-prem network security hardware or virtual...
January 8, 2019 |
Network Devices: Types, Functions and Best Practices for Security Management
The way networks are created, maintained and secured is constantly evolving. To manage a network responsibly and effectively, security professionals and web engineers must stay abreast of what different types of devices exist, what their functionality is and how they interact.
Below, we'll dive...