Our Blog

Stay up to date with the latest articles in Network Security
April 17, 2017

Application Whitelisting: What it is and why it’s good

Application whitelisting 1

Application whitelisting can be a great way to enhance network security and lock-out malware. But what are the drawbacks of application whitelisting? Is it the right choice for every environment?

Find the answers to these questions and more in this post. You’ll also see lists of free and paid application white listing tools, and resources you can use to learn more about this tool

Continue reading
Continue Reading
January 16, 2017

Healthcare Data Breaches Expected to Dominate 2017

EHR

Cyberattacks have pummeled the healthcare industry for years. Some of the biggest data breaches in history have struck there. And nothing is likely change soon.

See why healthcare is expected to top the list of cyber-targets for hackers and data thieves in 2017. You’ll also see why small data breaches are becoming a huge problem.

Continue reading
Continue Reading
December 30, 2016

DNC Hacks: How Spear Phishing Emails Were Used

Network Security Threats 1

Cyberattacks big and small often start with the same thing: phishing emails. That’s how the breach started at the DNC, and that’s how one is likely to start at your small business.

See how spear phishing emails breached a major U.S. political party, and see how the party’s mistakes can help improve network security at your company. You’ll also see the FBI’s latest report describing the hacks.

Continue reading
Continue Reading
December 19, 2016

Top Network Security Threats for Retailers this Holiday Season

Network Security Threats 1

The weeks around Christmas are always demanding for retailers. When caught up in the madness of the season, they may get lax on network security.

Doing so however can land a business in the midst of a breach scandal, resulting in fines and bad reputations. See what could be threatening your retail clients and how you can help.

Continue reading
Continue Reading
December 12, 2016

3 Dangerous Misconceptions about EMV Chip Cards and Readers

Strong Password Security 1

As more merchants begin to accept EMV chip cards, some may be feeling a false sense of security. Are the chip cards enough to protect them from PCI DSS fines?

No, they’re not. While they’re more secure than magnetic stripe cards, EMV cards are not a silver bullet to your client’s data security needs. See why in this post.

Continue reading
Continue Reading
November 28, 2016

Password Security: How to thwart hackers with a strong password

Strong Password Security 1

Passwords are often the only barrier between your data and malicious actors. But many users continue to use weak passwords like “123456”, putting their data and companies at risk.

See how attackers will try to steal your password, and see how to stop them, in this post on strong password security.

Continue reading
Continue Reading
November 21, 2016

New Types of Malware May Be Hiding in Your Network

Types of Malware 1

Malware is no strange foe to network security. But a few new tactics are raising eyebrows, such as “blastware” that destroys the systems that flag it as a threat.

See examples of new types of malware threats and what you can do about them. You’ll get a list of tips to help keep your clients safe.

Continue reading
Continue Reading
November 14, 2016

3 Common DNS Attacks and How to Fight Them

DNS attack

DNS attacks can shake the foundation of your network and even disrupt huge chunks of the internet. Just last month, a single day of attacks blocked access to sites like Netflix and Twitter for thousands of people.

How can DNS attacks harm your network? Find out in this post, and see three common types of DNS attacks and how to prevent them.

Continue reading
Continue Reading
November 7, 2016

HIPAA Violation Cases May Hit Record in 2016

medica-data-breach

Why is the healthcare industry at such high risk for data breaches? Because they have a lot of loot, and the lock on the gate has been rusty for years

We dig into data on the latest health care data breaches to show you the trends for 2016. See why this year is on pace to match the industry record for number of breaches reported.

Continue reading
Continue Reading
November 2, 2016

SSL VPN and IPsec VPN: How they work

IPsec-VPN-vs-SSL-VPN

Virtual private networks are a great tool to use when building your business’s network security plan. So what options do you have?

The two most common VPN types are SSL VPN and IPsec VPN. Read on to see how they measure up to your company’s needs.

Continue reading
Continue Reading
October 17, 2016

Types of Web Filters and How They Can Work for Your Clients

Types of Web Filters 1

Web filtering is one of the most widely available network security tools. Out of the many varieties, do you know which will work best for your clients?

Read on to familiarize yourself with the most common types of web filters around.

Continue reading
Continue Reading
1 7 8 9 10 11 17

About Us

Calyptix Security helps small and medium offices secure their networks so they can raise profits, protect investments, and control technology. Our customers do not waste time with security products designed for large enterprises. Instead, we make it easy for SMBs to protect and manage networks of up to 350 users.
GET STARTED
MSPRESELLER
home
contact
call us
call
linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram