Category Archives: Network security

Network Security vs. Endpoint Security: Which Matters More?

cyber security

_Cyber attacks affect 556 million victims per year, which amounts to 1.5 million victims per day and 18 victims per second. When funds are illegally stolen from a business or personal bank account, they’re only recoverable 22 percent of the

5 Critical Security Concerns That Every Sys Admin Should Check

IT departments may have a dedicated information security team or engineer whose primary responsibility is security, but each and every sys admin of any system on the network shares the responsibility for properly configuring and securing the systems in their

Utilizing a Network Scanner – Best Practices

Your auditor, your boss, or maybe that great book on security you just read, has you thinking you want to use a network scanner to help with the security on your network, but you’re just not really sure where to

Internet Monitoring Software – 3 Reasons Why It’s More Brotherly Love, Than Big Brother

Are corporations snooping on their employees? Are privacy issues being breached when companies use Internet monitoring software? We take a look at this issue and its security implications to see if corporations are turning into Big Brother, or if this

7 Reasons Why You Need Internet Monitoring Software

Internet monitoring software should be part of any organization’s defense-in-depth strategy, and can provide your business with several web security benefits. This solution protects your users, your systems, your data, and by extension, your customers, by countering the web threats

Are you being sniffed? (Video)

Sniffing attack is widely used  to intercept users login and passwords, here is a short video by GFI about ways to protect your network from such type of attacks.

BotHunter – Tracks and Isolate Network Malicious Threats

Today it is well-known that malwares and spams may bypass antiviruses and intrusion detection systems. if security software vendor did not develop the required signature for this attack than attacker will be able to execute the malicious software and take