Last week we announced an exciting new offer for all businesses in the US – a free silent business audit with forensic analysis.
How to protect your network from cyber-attacks
There are three measures network administrators can take to avoid the types of network attacks that plagued US and South Korean websites including www.whitehouse.gov, NASDAQ, NYSE, Yahoo!'s financial page and the Washington Post. The three areas to focus on are network based mitigation, host based mitigation and proactive measures. Network based mitigation: Install IDS/IPS with the ability to track floods (such as SYN, ICMP etc.) Install a firewall that has the ability to drop packets rather than have them reach the internal server.
Choose the battlefield
PC World's Jaikumar Vijayan recently reported on the attacks against US government public information infrastructure. In the article, Karen Evans, a Bush administration Information Systems executive outlined what she thought should be fast-tracked. It includes using TICs (Trusted Internet Connections) for all public infrastructures.
Google Chrome OS and Some Words On Hype
THE HYPE With the announcement of the upcoming Google Chrome OS, Google is adding some hype to the mix. Google is boldly stating that they are “going back to the basics and completely redesigning the underlying security architecture of the OS so that users don't have to deal with viruses, malware and security updates.
Tips for securing your Wi-Fi Connection
Recently, NPR's “All Tech Considered” posted a very good and concise article on securing WiFi technology. I would just like to add a few key points for those that concern themselves with network security. First, when using a VPN on an un-trusted hotspot, make sure that it is a “full tunnel” VPN
As Slowloris HTTP DoS Rises Astaro is Ready
Recently the Slowloris Denial of Service attack has jumped in popularity. This attack is similar to SYN flood, but uses HTTP instead, basically consuming sockets on the Web Server vs
Spam Is More Than Annoying
Not only is it annoying having to sift through all the garbage which clogs your inbox, but it costs you productivity as you attempt to separate the mails you need from the unwanted items. Spam rarely ends up in my own inbox due to the effectiveness of the blocking solution I use, (I use a solution from Astaro ) but many of the people I speak with daily communicate that in an inbox with 50 messages, 45 or more can easily be spam on a given day.
AxG Beta 7.460 Released
Greetings! We have issued another Beta Version of our not-yet-released 7.500, for those who are testing or wish to test the new features and functionality of our next major Up2Date release. For more information on the 7.500 Beta, please see our initial launch announcement . For more information on this new Beta version release, please read on
Lower Total Cost of Ownership with SonicWALL
Explore why SonicWALL enables lower total cost of ownership (TCO) in security deployments. Patrick Sweeney, VP of Product Management, SonicWALL.
SonicWALL and Your MSP Practice
Spend a few minutes with Jan Sijp hearing how we support managed service providers. Jan Sijp, Director, Product Management, SonicWALL.