logo
August 16, 2022 | Dirk Schrader

What Network Security Is and How to Fortify It

Cybersecurity threats are greater than ever. For example, the world has suffered a 645% increase in distributed denial-of-service (DDoS) attacks QoQ in March 2022, and a rise in ransomware equal to the past five years combined. Incidents like the SolarWinds hack of 2020 demonstrate that threats...
August 4, 2022 | Dirk Schrader

Open Port Vulnerabilities List

Insufficiently protected open ports can put your IT environment at serious risk. Threat actors often seek to exploit open ports and their applications through spoofing, credential sniffing and other techniques. For example, in 2017, cybercriminals spread WannaCry ransomware by exploiting an SMB...
October 1, 2019 | Jeff Melnick

Basics of Cisco Router Configuration

To start up a new Cisco LAN switch, all you have to do is plug in the Ethernet cables and power on the switch. However, you need to perform some basic Cisco router configuration before the basic router will start routing packets. In particular, the router needs to be told what interfaces (and which...
June 20, 2019 | Jeff Melnick

Map Network Drives or Shared Folders Using Group Policy in 8 Easy Steps

Mapping network drives is a common task for system administrators. One option is to create a batch script that runs every time the workstation starts. But there is a simpler and more convenient method: using Group Policy. Mapping network drives via Group Policy is faster and easier, so it is a much...
February 21, 2019 | Jeff Melnick

Why Native Network Device Auditing Is Not Enough

In one of my previous blog posts, I shared the top issues that network device auditing can help you solve. Among them are controlling device configuration, detecting unauthorized actions and thwarting scanning threats. In short, I argue that to keep your network infrastructure secure and ensure...
January 29, 2019 | Jeff Melnick

Why Monitoring of Network Devices Is Critical for Network Security

A secure network infrastructure is critical for organizations, and that requires keeping close track of what’s going on with routers, switches and other network devices. You need to be able to quickly detect and investigate threats to your perimeter security, such as unauthorized changes to...
January 22, 2019 | Dirk Schrader

The Most Common Types of Network Security Devices to Protect against External Attacks

On top of the many network devices that any enterprise should have today, there are a selection of network security tools and devices that can help you defend your network. While networking security tools have traditionally been implemented as on-prem network security hardware or virtual...
January 8, 2019 | Dirk Schrader

Network Devices: Types, Functions and Best Practices for Security Management

The way networks are created, maintained and secured is constantly evolving. To manage a network responsibly and effectively, security professionals and web engineers must stay abreast of what different types of devices exist, what their functionality is and how they interact. Below, we'll dive...
...