Zero Trust is a model for IT security in which access is only granted if the connecting devices and users are confirmed to be both authorized and authenticated. This is true regardless of the location of devices or their users. … Read More
Author Archives: Tommy Mcconnell
Insider Threats and the Zero Trust Model
In a world where the threat of attack from trusted insiders and penetrating outsiders within your network has increasing impact, you need to secure not only the borders of your organization’s network to defend against outside threats but the inside … Read More
Prevent Phishing Attacks, Keep Your Organization Safe
Prospective college students know the anxiety of waiting for college acceptance letters well. Unfortunately, the hackers behind one of the latest phishing attacks knew this too. According to the Chronicle of Higher Education, hackers sent prospective students at three colleges … Read More
How Cybersecurity Varies Between Industries
Cybersecurity is a critical issue for modern industries, but some industries have different needs than others. This is due to factors that vary between industries like motivation, attack vectors, regulations and organizational structure. Learning about these differences may help organizations … Read More
Banks of All Sizes Should Prepare for Cyber Attacks
While cyber attacks on large international banks attract most media attention, small banks are also at risk. A study from the Ponemon Institute and Accenture found the average number of breaches per financial services company was 125 in 2017. In … Read More
Gartner Highlights Dell’s Use of SafeConnect
When considering IT products, it is often critical to choose products that can work with one another. Users of Dell EMC’s networking products should rest assured Impulse’s SafeConnect Network Access Control (NAC) solution integrates so well with Dell’s networking products … Read More
Five Tips to Prepare for a Cybersecurity Audit
Learn Impulse’s five tips to making cybersecurity audits as simple as possible. Plain Text Version 5 TIPS TO PREPARE FOR A CYBERSECURITY AUDIT Are you implementing and enforcing everything in your cybersecurity plan? To ensure your audit goes smoothly, here … Read More
How to Decide Which IoT Devices to Allow
Today’s smart devices allow us to do everything from change the temperature of our oven to find our car keys. But the potential security threat these devices pose is a serious matter. A Gartner survey found that almost 20 percent … Read More
How to Stop your K12 Students from Accessing Inappropriate Websites
Most schools receiving federal funding are required to block inappropriate websites. This is usually accomplished with content-control software, but some students use proxies to get around these restrictions. Fortunately, there are ways school administrators can limit access to inappropriate websites … Read More