Resources in Cybersecurity
![[image] The Pros and Cons of VPN Split Tunneling](https://www.auvik.com/wp-content/uploads/2021/01/vpn-split-tunneling-decide-decision-1800x1200-1-800x600.jpg)
The Pros and Cons of VPN Split Tunneling
Should you use VPN split tunneling? Here's what you need to know to decide.
![[image] Security for Humans – FIT 071](https://www.auvik.com/wp-content/uploads/2020/09/people-first-security-cybersecurity-podcast-interview-1800x1200-1-300x180.jpg)
Security for Humans – FIT 071
Struggling to get users to comply with your IT security practices? You might be going about it…
![[image] Implementing a Bring Your Own Device Policy In Your Organization](https://www.auvik.com/wp-content/uploads/2020/07/bring-your-own-device-policy-1800x1200-2-300x180.png)
Implementing a Bring Your Own Device Policy In Your Organization
A bring your own device policy is more important than ever since users can bring unsecured…
![[image] Network Security Threats From the “Light Web” – FMSP 066](https://www.auvik.com/wp-content/uploads/2020/07/light-web-network-threats-data-brokers-cybersecurity-1800x1200-1-300x180.jpg)
Network Security Threats From the “Light Web” – FMSP 066
Today’s biggest network threats might just be coming at you from scammers using totally legal…
![[image] Managing IT Risk When Everyone’s Working Remote](https://www.auvik.com/wp-content/uploads/2020/06/IT-risk-remote-workers-cybersecurity-300x180.jpg)
Managing IT Risk When Everyone’s Working Remote
Top IT & cybersecurity experts share their advice for leaders scrambling to contend with a new…
![[image] Why a Zero-Trust Network Is More Desirable—and Achievable—Than Ever](https://www.auvik.com/wp-content/uploads/2020/06/zero-trust-network-1800x1200-1-300x180.png)
Why a Zero-Trust Network Is More Desirable—and Achievable—Than Ever
The cybersecurity landscape has changed a lot thanks to the increase in cloud-based services, and…
![[image] 9 Low-Cost or Free Cybersecurity Training Resources](https://www.auvik.com/wp-content/uploads/2020/05/free-cybersecurity-training-1800x1200-1-300x180.png)
9 Low-Cost or Free Cybersecurity Training Resources
Want to advance your career or make the most of your team’s professional development budget?…
![[image] How to Securely Enable Work From Home – FMSP 063](https://www.auvik.com/wp-content/uploads/2020/03/security-remote-work-from-home-IT-MSP-1800x1200-1-300x180.jpg)
How to Securely Enable Work From Home – FMSP 063
From developing BYOD policies to tips for helping workers secure their home networks, Webroot’s…
![[image] What Is Two-Factor Authentication and Why Is It Important?](https://www.auvik.com/wp-content/uploads/2020/02/two-factor-authentication-1800x1200-1-300x180.png)
What Is Two-Factor Authentication and Why Is It Important?
Two-factor authentication or 2FA requires a user to identify themselves in two ways—or using…
![[image] Using the NIST Cybersecurity Framework to Assess Your Clients’ Network Security](https://www.auvik.com/wp-content/uploads/2020/02/nist-cybersecurity-framework-1800x1200-1-800x400.png)
Using the NIST Cybersecurity Framework to Assess Your Clients’ Network Security
The NIST Cybersecurity Framework was intended to be used by internal IT teams, but its five major…
![[image] The Biggest Cybersecurity Threats for MSPs in 2020 – FMSP 059](https://www.auvik.com/wp-content/uploads/2020/01/cyber-security-predictions-criminals-deep-fakes-ransomware-podcast-1800x1200-1-300x180.jpg)
The Biggest Cybersecurity Threats for MSPs in 2020 – FMSP 059
What new and evolving security threats will you be grappling with this year? We dig into Trend…
![[image] Continuum Navigate East 2019: 4 Cybersecurity Takeaways](https://www.auvik.com/wp-content/uploads/2019/10/Continuum-Navigate-East-2019-1800x1200-300x180.jpeg)
Continuum Navigate East 2019: 4 Cybersecurity Takeaways
With recent MSP-targeted ransomware attacks fresh in the minds of all attendees, cybersecurity…
![[image] Fight Back: What You Can Do About MSP-Targeted Ransomware – FMSP 051](https://www.auvik.com/wp-content/uploads/2019/10/ransomware-MSP-cyberattack-fight-back-attackers-podcast-interview-1800x1200-300x180.jpg)
Fight Back: What You Can Do About MSP-Targeted Ransomware – FMSP 051
Wes Spencer of Perch Security reviews the practical steps you can take to protect yourselves,…
![[image] This New Wi-Fi Security Framework Brings Opportunity for MSPs – FMSP 047](https://www.auvik.com/wp-content/uploads/2019/07/wi-fi-security-wireless-security-trusted-wireless-environment-TWE-framework-1800x1200-300x180.jpg)
This New Wi-Fi Security Framework Brings Opportunity for MSPs – FMSP 047
WatchGuard’s Ryan Orsi explains the Wi-Fi security framework he wants to see supported…
![[image] This New Wi-Fi Security Framework Brings Opportunity for MSPs](https://www.auvik.com/wp-content/uploads/2019/07/wi-fi-security-wireless-security-trusted-wireless-environment-TWE-framework-1800x1200-300x180.jpg)
This New Wi-Fi Security Framework Brings Opportunity for MSPs
WatchGuard’s Ryan Orsi explains the Wi-Fi security framework he wants to see supported…
![[image] 5 Security Best Practices for Network Devices](https://www.auvik.com/wp-content/uploads/2019/01/network-device-security-best-practices-1800x1200-300x180.jpg)
5 Security Best Practices for Network Devices
What can you be doing to continually improve your network device security? Here are 5 things to…
![[image] To Protect and Secure: Selling Cybersecurity as a Service – Webinar (On Demand)](https://www.auvik.com/wp-content/uploads/2019/01/ToProtectAndSecure-300x180.jpg)
To Protect and Secure: Selling Cybersecurity as a Service – Webinar (On Demand)
A new year brings new threats, new exploits—and new MSP opportunities in cybersecurity.…
![[image] Zero-Trust Networks: When They Make Sense and When They Don’t – Webinar (On Demand)](https://www.auvik.com/wp-content/uploads/2018/09/Zero-Trust-Networks-300x180.jpg)
Zero-Trust Networks: When They Make Sense and When They Don’t – Webinar (On Demand)
Auvik AVP of product, Patrick Albert, interviews security expert Nick Espinosa to uncover the…
![[image] Adding Cybersecurity to a Managed Services Portfolio – FMSP 023](https://www.auvik.com/wp-content/uploads/2018/07/managed-security-services-podcast-interview-023-1800x200-300x180.jpg)
Adding Cybersecurity to a Managed Services Portfolio – FMSP 023
Nick Espinosa of MSSP Security Fanatics discusses some of the pitfalls in layering on security…
![[image] Not All Hacks Are the Same, Plan Your Network Defenses Accordingly](https://www.auvik.com/wp-content/uploads/2018/04/ransomware-attack-defenses-smash-grab-1800x1200-300x180.jpg)
Not All Hacks Are the Same, Plan Your Network Defenses Accordingly
There’s a vast difference between the incredibly sophisticated long-term attacks against…
![[image] Visibility for Security: You Can’t Protect What You Can’t See – Webinar (On Demand)](https://www.auvik.com/wp-content/uploads/2018/04/Visibility-for-Security-300x180.jpg)
Visibility for Security: You Can’t Protect What You Can’t See – Webinar (On Demand)
As an MSP, your first line of defense for clients is visibility. You need to know exactly which…
![[image] New WPA3 Security Protocol Holds Promise—But It’s Hard to Know Where It Will Succeed](https://www.auvik.com/wp-content/uploads/2018/04/WPA3-analysis-assessment-WiFi-security-protocol-1800x1200-800x400.jpg)
New WPA3 Security Protocol Holds Promise—But It’s Hard to Know Where It Will Succeed
Lee Badman shares his WPA3 analysis: "As a 20-year veteran of the WLAN industry, I’m not saying…
![[image] How to Secure That Small Business WLAN](https://www.auvik.com/wp-content/uploads/2018/04/wireless-security-Wi-Fi-padlock-chain-1800x1200-300x180.jpg)
How to Secure That Small Business WLAN
There are many ways to approach wireless security, and businesses of any size have options.…
![[image] What MSPs Can Learn from the KRACK Wi-Fi Vulnerability](https://www.auvik.com/wp-content/uploads/2017/10/krack-Wi-Fi-rant-1800x1200-300x180.jpg)
What MSPs Can Learn from the KRACK Wi-Fi Vulnerability
Don’t let the KRACK hysteria fade without at least getting patched far and wide, and assessing…
![[image] Defending Network Infrastructure Against Attack – Part 2](https://www.auvik.com/wp-content/uploads/2016/05/network-infrastructure-security-armored-knights-1800x1200-300x180.jpg)
Defending Network Infrastructure Against Attack – Part 2
Since perfect network security is impossible, your goal is to cover as many of the risk areas as…
![[image] Defending Network Infrastructure Against Attack – Part 1](https://www.auvik.com/wp-content/uploads/2016/05/network-infrastructure-security-armored-knights-1800x1200-300x180.jpg)
Defending Network Infrastructure Against Attack – Part 1
It’s impossible to create perfect network defenses. But it's not terribly hard or expensive to…
![[image] Are You Still Using Insecure Network Protocols?](https://www.auvik.com/wp-content/uploads/2015/09/insecure-network-protocols-Telnet-1800x1200-300x180.jpg)
Are You Still Using Insecure Network Protocols?
Are you taking at least basic precautions to ensure logins and communications between the devices…
![[image] Google, Zero-Trust Networks, and the Future of Security](https://www.auvik.com/wp-content/uploads/2015/05/zero-trust-network-security-1800x1200-300x180.jpg)
Google, Zero-Trust Networks, and the Future of Security
Back in January, I blogged about zero-trust network architecture as an emerging trend. Zero-trust…
![[image] An Introduction to Authentication Protocols](https://www.auvik.com/wp-content/uploads/2015/03/authentication-protocols-locks-1800x1200-300x180.jpg)
An Introduction to Authentication Protocols
Centralized authentication improves the manageability & security of your network. In this…
![[image] Network Basics: Access Lists](https://www.auvik.com/wp-content/uploads/2014/05/access-control-lists-ACLs-firewalls-network-security-1800x1200-300x180.jpg)
Network Basics: Access Lists
Learn common uses for access lists (ACLs), the different kinds of lists, and how to implement…