Author Archives: Tommy Mcconnell

Someone offers a tablet that reads "data security" with a pen to symbolize the need for Zero Trust to provide data security.

What is the Zero Trust Model

Zero Trust is a model for IT security in which access is only granted if the connecting devices and users are confirmed to be both authorized and authenticated. This is true regardless of the location of devices or their users. … Read More

Employee wrapped in caution tape representing an internal threat. Demonstrating the need for the Zero Trust model to protect against internal threats.

Insider Threats and the Zero Trust Model

In a world where the threat of attack from trusted insiders and penetrating outsiders within your network has increasing impact, you need to secure not only the borders of your organization’s network to defend against outside threats but the inside … Read More

Hacker reaches hand through computer to simulate a phishing attack.

Prevent Phishing Attacks, Keep Your Organization Safe

Prospective college students know the anxiety of waiting for college acceptance letters well. Unfortunately, the hackers behind one of the latest phishing attacks knew this too. According to the Chronicle of Higher Education, hackers sent prospective students at three colleges … Read More

A man working at a laptop displaying a login screen with a shadowy figure in the background.

How Cybersecurity Varies Between Industries

Cybersecurity is a critical issue for modern industries, but some industries have different needs than others. This is due to factors that vary between industries like motivation, attack vectors, regulations and organizational structure. Learning about these differences may help organizations … Read More

Banks of All Sizes Should Prepare for Cyber Attacks

While cyber attacks on large international banks attract most media attention, small banks are also at risk. A study from the Ponemon Institute and Accenture found the average number of breaches per financial services company was 125 in 2017. In … Read More

Business people reading Impulse's report about Gartner's highlights of Dell's use of SafeConnect.

Gartner Highlights Dell’s Use of SafeConnect

When considering IT products, it is often critical to choose products that can work with one another. Users of Dell EMC’s networking products should rest assured Impulse’s SafeConnect Network Access Control (NAC) solution integrates so well with Dell’s networking products … Read More

Five Tips to Prepare for a Cybersecurity Audit

Learn Impulse’s five tips to making cybersecurity audits as simple as possible. Plain Text Version 5 TIPS TO PREPARE FOR A CYBERSECURITY AUDIT Are you implementing and enforcing everything in your cybersecurity plan? To ensure your audit goes smoothly, here … Read More

How to Decide Which IoT Devices to Allow

Today’s smart devices allow us to do everything from change the temperature of our oven to find our car keys. But the potential security threat these devices pose is a serious matter. A Gartner survey found that almost 20 percent … Read More

How to Stop your K12 Students from Accessing Inappropriate Websites

Most schools receiving federal funding are required to block inappropriate websites. This is usually accomplished with content-control software, but some students use proxies to get around these restrictions. Fortunately, there are ways school administrators can limit access to inappropriate websites … Read More

Impulse is part of OPSWAT | Press Release | In January 2022, impulse.com will be retired and users directed to opswat.com