Network monitoring and management

Most IT buyers put network monitoring and management tools in place and expect them to just work. Unfortunately, the tools require upfront planning, detailed configuration and ongoing maintenance to ensure the technology delivers on its promise. Inventory To...

Are your customers ready to repel ransomware?

More than four out of five (83%) resellers see ransomware attacks as the main threat – but most are not ready to counter any such attack. In a survey carried out for WatchGuard, 45% of resellers said they believed less than half of their customers would have the right...

Recommended Server Room Temperature

An exploration of the recommended server room temperature and the issues surrounding maintaining the recommended temperature. Figuring out the right temperature to run your server room at can be tricky, you don’t want to run the server room too hot and...

Best practices for firewall rules configuration

When you modify a firewall configuration, it is important to consider potential security risks to avoid future issues. Security is a complex topic and can vary from case to case, but this article describes best practices for configuring perimeter firewall rules. Block...

Businesses under-reporting cyber attacks

Businesses are underestimating the importance of cyber security with 28% of cyber attacks being reported to the police, according to research by the Institute of Directors (IoD). A survey of 1000 businesses found that 49% have experienced damage and interruptions to...

Setting a Secure Password

When choosing your password we recommend using 3 word password phrases to set your passwords, rather than complex gibberish types. There are several freely available password cracking tools out there and there are 3 common techniques to crack a password: Brute force =...

Pin It on Pinterest