<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=176059862897267&amp;ev=PageView&amp;noscript=1">

Most Recent

How to Secure the Blind Spots in Your Network

Posted by Security Tech Alliance on May 30, 2017 8:30:00 AM | Topics: Malware, Firewall, Data Protection, Access Management

In a previous blog, we explored the common blind spots in company networks. As networks increase in complexity, cyberattacks become more difficult to detect and prevent. Virtualized infrastructure and mobile endpoints make workplaces more efficient and flexible, but they also reduce network visibility and create opportunities for hackers to infiltrate your system. While encrypting your traffic protects your sensitive data from prying eyes, it can also prevent your security tools from seeing anomalous patterns that signal a breach.

Read More

3 Ways to Protect Your Network From Insecure Edge Devices

Posted by Security Tech Alliance on May 23, 2017 8:05:00 AM | Topics: Firewall, Data Protection, Access Management

Edge devices are crucial entry points to your network. Routers and modems enable users to connect with your system and allow your company’s computers to communicate with each other. Unfortunately, these entry points are like chinks in your armor that allow cybercriminals to gain access.

Read More

Is Your Port 3389 Safe From Samas? | Ransomware

Posted by Security Tech Alliance on May 9, 2017 8:00:00 AM | Topics: Malware, Firewall, Risk Management, Data Protection

In our last blog, we profiled a recent ransomware attack that exploited a new attack vector. Instead of reeling in a victim with an infected phishing email, the hacker used an exposed remote desktop protocol (RDP) port to gain entry to the victim’s system.

Read More

Top 5 Reasons to Switch to Internal Network Segmentation

Posted by Security Tech Alliance on Jan 3, 2017 12:15:48 PM | Topics: Firewall

The traditional firewall is one simple perimeter that surrounds an organization’s network. Once a hacker makes it past that firewall, the interior is flat. A flat network configuration makes it easy for hackers to access an organization’s data, as there are no further firewalls or obstacles to overcome.

This type of flat network might have been enough to protect an organization’s data a decade or so ago. But, the threats of today have created the need for a different solution.

Internal network segmentation offers a new kind of protection. To create internal network segmentation, an administrator places an internal segmentation firewall (ISFW) in front of specific collateral, like servers, routers, gateways, applications, and devices. The internal firewalls act to create barriers on the inside of the network. Administrators use information from the firewall to recognize and contain threats.

Read More

Blog Search


Get this eBook covering three prominent threats faced by six critical industries.

Get Your eBook


Stay up-to-date with the latest cyber-security developments and threats facing organizations today. You will receive actionable information to keep your data and applications secure.