Egress filtering is a powerful tool that can disrupt many attacks. It does this by controlling outbound connections from the network and blocking any that are disallowed.
But egress filtering is easy to misconfigure. In this post, you will get a quick review of egress filtering, including tips on where, why, and how to deploy it.Continue reading
Focusing your marketing and sales efforts on a niche can be a great way to accelerate growth at your IT business. Once you land your first client, your second, third, and fourth can be just a referral away.
One Calyptix partner has had great success selling in the market for dental IT and integration. Read on to see his tips and secrets for breaking in.Continue reading
The threat of ransomware continues to loom over us in 2015, and some expect the storm to get worse before it clears. How can you ride out this threat?
Get the five ways to prevent a ransomware disaster at your business. We sat down with expert Amy Babinchak to get her view. Includes a link to her team’s free Cryptolocker Prevention Kit.Continue reading
CryptoWall is the latest strain of ransomware to lock files and demand ransom payments to release them. But does paying the ransom work?
You'll find out inside. You'll also learn more about the threat and how to prevent it from hurting your organization.Continue reading
POS malware is breaking through defenses at retailers across the nation -- but why are POS systems so vulnerable? And how can you stop this threat?
See 5 reasons why POS malware is winning the battle and 18 ways you can boost POS security to block it.Continue reading
Small office and home office routers (SOHO) can have so many security flaws that a hacker contest has been started to highlight the issue. The contest awards prizes to hackers who can discover new vulnerabilities in 10 popular routers.
What a great time to cover router security! In this post, you get 12 ways to improve the security of your wireless router, and you'll see why it might be best to leave the "routing" of network traffic to another device.Continue reading