Tags » Firewalls

An Introduction to Unified Threat Management

Enterprise networks are always vulnerable and prone to external threats from virus attacks, network intrusion, spams, worms etc. Different network security technologies were introduced in recent years to safeguard the network from these attacks in order to preserve enterprise resources.Separate modules for protecting the network from viruses and worms were designed, enabling phishing attacks and pharming to be hindered in order to secure credentials of the user. 334 more words

Bangladesh bank hack shows need for strong security systems

The Bangladesh bank hack in February highlighted the increasing vulnerabilities the global banking system faces in an interconnected world.

The hack on the Central Bank of Bangladesh that saw $81m being fraudulently taken from its funds shocked the banking world, highlighting, as it did, how one weak link could potentially jeopardise a global system. 1,063 more words

Cisco/Linksys Bad Gateway

Recently after installing a new Linksys (Cisco) EA6300 router we received a “502 – Bad Gateway” error message when trying to access the web management page. 190 more words


Meraki Auto-VPN over MPLS

Here’s a quick review of a recent Meraki MX deployment I wrapped up this week. The customer has 4 sites across Canada; one HQ with an Internet and MPLS connection, and 3 branches with only MPLS connections. 605 more words

Not Wi-Fi

Google Trick-Unblock Websites

Now a days every organisation focuses on their web security and internet policies within office. Here is a quick google trick to unblock websites that you wish to surf or translate the content in language of your choice. 64 more words


Firewalls, elevator doors, run blocking

Firewalls sit on a pathway. When something arrives on the path, the firewall makes a decision: if it’s good, allow it through; if it’s bad, block it. 88 more words