Resources in 'Network security'

[image] Continuum Navigate East 2019: 4 Cybersecurity TakeawaysEvents

Continuum Navigate East 2019: 4 Cybersecurity Takeaways

With recent MSP-targeted ransomware attacks fresh in the minds of all attendees, cybersecurity took Continuum Navigate East 2019 by storm. What was everyone saying? We put together a list of four key takeaways from the event to fill you in.

Annette HynesOct 8, 2019
[image] Fight Back: What You Can Do About MSP-Targeted Ransomware – FMSP 051Managed services industry

Fight Back: What You Can Do About MSP-Targeted Ransomware – FMSP 051

Wes Spencer of Perch Security reviews the practical steps you can take to protect yourselves,…

Jennifer TribeOct 3, 2019
[image] This New Wi-Fi Security Framework Brings Opportunity for MSPs – FMSP 047Network management

This New Wi-Fi Security Framework Brings Opportunity for MSPs – FMSP 047

WatchGuard’s Ryan Orsi explains the Wi-Fi security framework he wants to see supported…

Jennifer TribeJul 11, 2019
[image] This New Wi-Fi Security Framework Brings Opportunity for MSPsNetwork security

This New Wi-Fi Security Framework Brings Opportunity for MSPs

WatchGuard’s Ryan Orsi explains the Wi-Fi security framework he wants to see supported…

Ryan OrsiJul 9, 2019
[image] 5 Security Best Practices for Network DevicesNetwork security

5 Security Best Practices for Network Devices

What can you as an MSP be doing to continually improve the security of your clients’ network…

Steve PetryschukJan 29, 2019
[image] To Protect and Secure: Selling Cybersecurity as a Service – Webinar (On Demand)Managed services industry

To Protect and Secure: Selling Cybersecurity as a Service – Webinar (On Demand)

A new year brings new threats, new exploits—and new MSP opportunities in cybersecurity.…

Sam TrieuJan 28, 2019
[image] Zero-Trust Networks: When They Make Sense and When They Don’t – Webinar (On Demand)Network security

Zero-Trust Networks: When They Make Sense and When They Don’t – Webinar (On Demand)

Auvik AVP of product, Patrick Albert, interviews security expert Nick Espinosa to uncover the…

Jennifer TribeSep 4, 2018
[image] Adding Cybersecurity to a Managed Services Portfolio – FMSP 023Network security

Adding Cybersecurity to a Managed Services Portfolio – FMSP 023

Nick Espinosa of MSSP Security Fanatics discusses some of the pitfalls in layering on security…

Jennifer TribeJul 26, 2018
[image] Not All Hacks Are the Same, Plan Your Network Defenses AccordinglyNetwork management

Not All Hacks Are the Same, Plan Your Network Defenses Accordingly

There’s a vast difference between the incredibly sophisticated long-term attacks against…

Kevin DooleyApr 24, 2018
[image] Visibility for Security: You Can’t Protect What You Can’t See – Webinar (On Demand)Network security

Visibility for Security: You Can’t Protect What You Can’t See – Webinar (On Demand)

As an MSP, your first line of defense for clients is visibility. You need to know exactly which…

Jennifer TribeApr 18, 2018
[image] New WPA3 Security Protocol Holds Promise—But It’s Hard to Know Where It Will SucceedWireless networks

New WPA3 Security Protocol Holds Promise—But It’s Hard to Know Where It Will Succeed

Lee Badman shares his WPA3 analysis: "As a 20-year veteran of the WLAN industry, I’m not saying…

Lee BadmanApr 17, 2018
[image] How to Secure That Small Business WLANWireless networks

How to Secure That Small Business WLAN

There are many ways to approach wireless security, and businesses of any size have options.…

Lee BadmanApr 3, 2018
[image] What MSPs Can Learn from the KRACK Wi-Fi Vulnerability

What MSPs Can Learn from the KRACK Wi-Fi Vulnerability

Don’t let the KRACK hysteria fade without at least getting patched far and wide, and assessing…

Lee BadmanOct 24, 2017
[image] Are Network Blind Spots Killing Your MSP?

Are Network Blind Spots Killing Your MSP?

Network blind spots are the things you can't see and don't know about — and they can be deadly…

Alex HoffJul 19, 2016
[image] Defending Network Infrastructure Against Attack – Part 2

Defending Network Infrastructure Against Attack – Part 2

Since perfect network security is impossible, your goal is to cover as many of the risk areas as…

Kevin DooleyMay 24, 2016
[image] Defending Network Infrastructure Against Attack – Part 1

Defending Network Infrastructure Against Attack – Part 1

It’s impossible to create perfect network defenses. But it's not terribly hard or expensive to…

Kevin DooleyMay 17, 2016
[image] Are You Still Using Insecure Network Protocols?

Are You Still Using Insecure Network Protocols?

Are you taking at least basic precautions to ensure logins and communications between the devices…

Dana OrosSep 8, 2015
[image] Google, Zero-Trust Networks, and the Future of Security

Google, Zero-Trust Networks, and the Future of Security

Back in January, I blogged about zero-trust network architecture as an emerging trend. Zero-trust…

Kevin DooleyMay 26, 2015
[image] An Introduction to Authentication Protocols

An Introduction to Authentication Protocols

Centralized authentication improves the manageability & security of your network. In this…

Kevin DooleyMar 31, 2015
[image] Network Basics: Access ListsNetwork management

Network Basics: Access Lists

Learn common uses for access lists (ACLs), the different kinds of lists, and how to implement…

Ethan BanksMay 20, 2014
Hi! Looks like you have JavaScript disabled. Please turn it on so you can see and interact with everything on our site.