arrow-left2arrow-right2Vector Smart Object7Vector Smart Object2Vector Smart Object111Vector Smart Object1snapchat

Internetwork Engineering Blog

IE and industry related news, articles, announcements, and more.

Lock It Down: 10 Simple Ways to Boost the Security of Your Network

[fa icon="calendar'] September 21, 2018 - Written by Dave Barus
Posted in Security


“Hurry up and deploy the gear. We have a deadline. Just get it done. We’ll go back later to lock it down.” Sound familiar? For years now, it’s been commonplace for network engineers to do just this. Except, someone rarely goes back to “lock it down”. There are countless ways to improve network security, but today we’ll focus on the low-hanging fruit by providing you with ten simple practices.

Read More

VPNFilter and The Importance of The Home Network

[fa icon="calendar'] August 15, 2018 - Written by Bill Baerwalde
Posted in Intelligent Infrastructure, Security

Since May of 2018, we’ve heard a lot about VPNFilter malware and the growing number of affected devices. We’ve even been given the directive to reboot our routers to stop the malware which also enables the FBI and other security groups to better track it. While rebooting the router won’t remove the malware, it will stop the advanced portions of VPNFilter from continuing. To remove the Stage 1 VPNFilter payload, you must apply the proper patch and updates from the manufacturer.

Read More

What’s a Whitelist and Why Do You Need One?

[fa icon="calendar'] July 17, 2018 - Written by Richard Babb
Posted in Intelligent Infrastructure, Security


With the internet, in all its glory, playing host to over 1.8 billion websites that can be accessed by virtually anyone in the world, it stands to reason that businesses may not want users accessing some of these websites due to security threats, inappropriateness, or other factors while on their network. How can businesses control what websites their users gain access to? Typically, most organizations have utilized a blacklist, which identifies websites that users are not allowed to access. This method is not very restrictive and can be problematic in that it allows access to everything, and I do mean EVERYTHING, that is not on the blacklist. A whitelist, as you might guess, is the exact opposite of a blacklist, and only grants access to websites explicitly identified on the list. If the site isn’t on the list, then the user isn’t granted access to it. The concept of a whitelist has been around for many years in website filtering but has seldom been implemented. It can also be problematic because, given the breadth and depth of the internet, only a fraction of the available websites would be allowed.

Read More

In an era of intensified cybercrime, organizations can improve business outcomes with advanced malware protection

[fa icon="calendar'] July 9, 2018 - Written by Internetwork Engineering
Posted in Security

 

Read More

Advances In Cybercrime Demand Greater Protection: A look at retrospective security versus point-in-time solutions

[fa icon="calendar'] June 28, 2018 - Written by Internetwork Engineering
Posted in Security


With cybercrime predicted to reach $6 trillion annually by 2021 and to be more profitable—and therefore, more attractive to criminal organizations—than the global combined trade of all major illegal drugs, businesses can no longer rely on traditional network security tools and expect to achieve protection.[1] 

Read More