logo
August 1, 2024 | Dirk Schrader

Common Types of Network Devices and Their Functions

Modern IT infrastructure is comprised of various interconnected network components that make communication and resource sharing possible throughout your organization. Whether securing sensitive data, facilitating collaboration, or simply ensuring uninterrupted access, a network of devices is at...
July 16, 2024 | Dirk Schrader

The Fundamentals of Network Access Management

With cyber threats constantly evolving, securing your network is more than just strong passwords or firewalls—it's ensuring that the right people have access to the right resources at the right times. Understanding and implementing effective network access management is the cornerstone of...
August 16, 2022 | Dirk Schrader

What Network Security Is and How to Fortify It

Cybersecurity threats are greater than ever. For example, the world has suffered a 645% increase in distributed denial-of-service (DDoS) attacks QoQ in March 2022, and a rise in ransomware equal to the past five years combined. Incidents like the SolarWinds hack of 2020 demonstrate that threats...
August 4, 2022 | Dirk Schrader

Open Port Vulnerabilities List

Insufficiently protected open ports can put your IT environment at serious risk. Threat actors often seek to exploit open ports and their applications through spoofing, credential sniffing and other techniques. For example, in 2017, cybercriminals spread WannaCry ransomware by exploiting an SMB...
October 1, 2019 | Jeff Melnick

Basics of Cisco Router Configuration

To start up a new Cisco LAN switch, all you have to do is plug in the Ethernet cables and power on the switch. However, you need to perform some basic Cisco router configuration before the basic router will start routing packets. In particular, the router needs to be told what interfaces (and which...
June 20, 2019 | Paul Stephens

Map Network Drives or Shared Folders Using Group Policy in 8 Easy Steps

Mapping network drives with Group Policy offers a centralized, scalable alternative to logon scripts. Administrators can create Group Policy Objects linked to user OUs, configure mapped drives with actions such as Create, Update, or Replace, and apply item-level targeting for flexibility. Once...
February 21, 2019 | Paul Stephens

Why Native Network Device Auditing Is Not Enough

Native network device auditing tools provide limited visibility, fragmented logs, and weak reporting, making it difficult to detect incidents or prove compliance. Vendor tools add complexity and siloed audit trails, while free third-party options lack functionality. Paid third-party solutions...
January 29, 2019 | Paul Stephens

Why Monitoring of Network Devices Is Critical for Network Security

Monitoring routers, switches, and VPN gateways is critical for detecting misconfigurations, unauthorized logons, scanning threats, and risky VPN activity that can undermine perimeter security. Continuous auditing with alerting ensures accountability, speeds incident response, and supports...
January 22, 2019 | Dirk Schrader

The Most Common Types of Network Security Devices to Protect against External Attacks

On top of the many network devices that any enterprise should have today, there are a selection of network security tools and devices that can help you defend your network. While networking security tools have traditionally been implemented as on-prem network security hardware or virtual...
...