Tag: Network devices
August 1, 2024 |
Common Types of Network Devices and Their Functions
Modern IT infrastructure is comprised of various interconnected network components that make communication and resource sharing possible throughout your organization. Whether securing sensitive data, facilitating collaboration, or simply ensuring uninterrupted access, a network of devices is at...
July 16, 2024 |
The Fundamentals of Network Access Management
With cyber threats constantly evolving, securing your network is more than just strong passwords or firewalls—it's ensuring that the right people have access to the right resources at the right times. Understanding and implementing effective network access management is the cornerstone of...
August 16, 2022 |
What Network Security Is and How to Fortify It
Cybersecurity threats are greater than ever. For example, the world has suffered a 645% increase in distributed denial-of-service (DDoS) attacks QoQ in March 2022, and a rise in ransomware equal to the past five years combined. Incidents like the SolarWinds hack of 2020 demonstrate that threats...
August 4, 2022 |
Open Port Vulnerabilities List
Insufficiently protected open ports can put your IT environment at serious risk. Threat actors often seek to exploit open ports and their applications through spoofing, credential sniffing and other techniques. For example, in 2017, cybercriminals spread WannaCry ransomware by exploiting an SMB...
October 1, 2019 |
Basics of Cisco Router Configuration
To start up a new Cisco LAN switch, all you have to do is plug in the Ethernet cables and power on the switch. However, you need to perform some basic Cisco router configuration before the basic router will start routing packets. In particular, the router needs to be told what interfaces (and which...
June 20, 2019 |
Map Network Drives or Shared Folders Using Group Policy in 8 Easy Steps
Mapping network drives is a common task for system administrators. One option is to create a batch script that runs every time the workstation starts. But there is a simpler and more convenient method: using Group Policy. Mapping network drives via Group Policy is faster and easier, so it is a much...
February 21, 2019 |
Why Native Network Device Auditing Is Not Enough
In one of my previous blog posts, I shared the top issues that network device auditing can help you solve. Among them are controlling device configuration, detecting unauthorized actions and thwarting scanning threats. In short, I argue that to keep your network infrastructure secure and ensure...
January 29, 2019 |
Why Monitoring of Network Devices Is Critical for Network Security
A secure network infrastructure is critical for organizations, and that requires keeping close track of what’s going on with routers, switches and other network devices. You need to be able to quickly detect and investigate threats to your perimeter security, such as unauthorized changes to...
January 22, 2019 |
The Most Common Types of Network Security Devices to Protect against External Attacks
On top of the many network devices that any enterprise should have today, there are a selection of network security tools and devices that can help you defend your network. While networking security tools have traditionally been implemented as on-prem network security hardware or virtual...