Resources in Network security

Continuum Navigate East 2019: 4 Cybersecurity Takeaways

With recent MSP-targeted ransomware attacks fresh in the minds of all attendees, cybersecurity took Continuum Navigate East 2019 by storm. What was everyone saying? We put together a list of four key takeaways from the event to fill you in.

Annette HynesOct 8, 2019

Fight Back: What You Can Do About MSP-Targeted Ransomware – FMSP 051

Wes Spencer of Perch Security reviews the practical steps you can take to protect yourselves, your clients, and the managed services…

Jennifer TribeOct 3, 2019

This New Wi-Fi Security Framework Brings Opportunity for MSPs – FMSP 047

WatchGuard’s Ryan Orsi explains the Wi-Fi security framework he wants to see supported industry-wide—and how MSPs can use it to…

Jennifer TribeJul 11, 2019

This New Wi-Fi Security Framework Brings Opportunity for MSPs

WatchGuard’s Ryan Orsi explains the Wi-Fi security framework he wants to see supported industry-wide.

Ryan OrsiJul 9, 2019

5 Security Best Practices for Network Devices

What can you as an MSP be doing to continually improve the security of your clients’ network infrastructure devices? Here are some…

Steve PetryschukJan 29, 2019

To Protect and Secure: Selling Cybersecurity as a Service – Webinar (On Demand)

A new year brings new threats, new exploits—and new MSP opportunities in cybersecurity. Understanding global technology trends and…

Sam TrieuJan 28, 2019

Zero-Trust Networks: When They Make Sense and When They Don’t – Webinar (On Demand)

Auvik AVP of product, Patrick Albert, interviews security expert Nick Espinosa to uncover the benefits and risks of implementing a…

Jennifer TribeSep 4, 2018

Adding Cybersecurity to a Managed Services Portfolio – FMSP 023

Nick Espinosa of MSSP Security Fanatics discusses some of the pitfalls in layering on security services in an MSP as well as best…

Jennifer TribeJul 26, 2018

Not All Hacks Are the Same, Plan Your Network Defenses Accordingly

There’s a vast difference between the incredibly sophisticated long-term attacks against high-profile companies and government…

Kevin DooleyApr 24, 2018

Visibility for Security: You Can’t Protect What You Can’t See – Webinar (On Demand)

As an MSP, your first line of defense for clients is visibility. You need to know exactly which devices you’re protecting and how those…

Jennifer TribeApr 18, 2018

New WPA3 Security Protocol Holds Promise—But It’s Hard to Know Where It Will Succeed

Lee Badman shares his WPA3 analysis: "As a 20-year veteran of the WLAN industry, I’m not saying WPA3 won’t be good for the greater…

Lee BadmanApr 17, 2018

How to Secure That Small Business WLAN

There are many ways to approach wireless security, and businesses of any size have options. Let’s talk about how I approach my own…

Lee BadmanApr 3, 2018
[image] What MSPs Can Learn from the KRACK Wi-Fi VulnerabilityFrankly MSP blog icon

What MSPs Can Learn from the KRACK Wi-Fi Vulnerability

Don’t let the KRACK hysteria fade without at least getting patched far and wide, and assessing what could happen if unpatchable devices…

Lee BadmanOct 24, 2017
[image] Are Network Blind Spots Killing Your MSP?Frankly MSP blog icon

Are Network Blind Spots Killing Your MSP?

Network blind spots are the things you can't see and don't know about — and they can be deadly dangerous. Learn more about the most…

Alex HoffJul 19, 2016
[image] Defending Network Infrastructure Against Attack – Part 2Frankly MSP blog icon

Defending Network Infrastructure Against Attack – Part 2

Since perfect network security is impossible, your goal is to cover as many of the risk areas as you can with the budget you have. In…

Kevin DooleyMay 24, 2016
[image] Defending Network Infrastructure Against Attack – Part 1Frankly MSP blog icon

Defending Network Infrastructure Against Attack – Part 1

It’s impossible to create perfect network defenses. But it's not terribly hard or expensive to mount an effective defense. Let’s…

Kevin DooleyMay 17, 2016
[image] Are You Still Using Insecure Network Protocols?Frankly MSP blog icon

Are You Still Using Insecure Network Protocols?

Are you taking at least basic precautions to ensure logins and communications between the devices you manage are secure?

Dana OrosSep 8, 2015
[image] Google, Zero-Trust Networks, and the Future of SecurityFrankly MSP blog icon

Google, Zero-Trust Networks, and the Future of Security

Back in January, I blogged about zero-trust network architecture as an emerging trend. Zero-trust is now in the news again with Google's…

Kevin DooleyMay 26, 2015
[image] An Introduction to Authentication ProtocolsFrankly MSP blog icon

An Introduction to Authentication Protocols

Centralized authentication improves the manageability & security of your network. In this article, network engineer Kevin Dooley…

Kevin DooleyMar 31, 2015

Network Basics: Access Lists

Learn common uses for access lists (ACLs), the different kinds of lists, and how to implement ACLs effectively.

Ethan BanksMay 20, 2014
Hi! Looks like you have JavaScript disabled. Please turn it on so you can see and interact with everything on our site.