Blog

Learn about Insider Threat Awareness Month and the Process of mitigating insider threats.

Insider Threats Get Their Own Month

Awareness that insider threats are every organizations weak spot is worth spreading, to that end Impulse would like to help spread the word to our customers that this month is the first annual Insider Threat Awareness Month. The event is … Read More

Data breach database

Lessons From a 161 Million Record Database Data Breach

Each day, people share their information with websites in order to receive services. Unfortunately, those services can be insecure. According to scmagazine, a recent database data breach on a MoviePass subdomain exposed 161 million records. This could have potentially exposed … Read More

In the SDP Vs VPN debate, SDP has a use case as a next generation VPN.

SDP Vs VPN —Why not the best of both?

Due to the frequent use of mobile devices and public Wi-Fi networks, resources often need to be accessible from anywhere. But this accessibility must be balanced with the need for security. Traditional VPNs enable secure remote access, but more is … Read More

A man learning to secure his wireless network on his tablet.

How to Secure My Wireless Network

With wireless networks everywhere from secret research facilities to coffee shops, learning how to secure your wireless network is critical. There isn’t a perfect Wi-Fi security strategy, as such, securing a network requires a combination of techniques that will need … Read More

network segmentation demonstration

What is network segmentation?

Putting all your organization’s devices onto one public network and allowing VPN access to cloud-based resources without internal security is an ideal situation for hackers looking to steal data. But when internet connecting devices are everywhere from your phones to … Read More

visual impacts of ransomware.

How to Prevent Ransomware from Affecting Businesses

A recent ransomware attack on Baltimore has affected city infrastructure such as hospitals, airports, and ATMs according to the Baltimore Sun. Yet the effects of ransomware are not limited to city infrastructure. Ransomware can affect everything from personal computers to … Read More

VPN vulnerability that shows the need for Zero Trust Network Access.

VPN Vulnerability Shows Need for Software Defined Perimeter

The Department of Homeland Security issued a warning last month about VPN packages from F5, Palo Alto, Pulse, and Cisco. According to Network World, these packages might fail to properly secure tokens and cookies. This could enable cyber criminals to … Read More

Couple shopping for the latest tech, theoretically including Network Access Control (NAC).

The State of Network Access Control

When it comes to controlling access to your network, there are three data points that are more important than any others. Knowing who accesses, what accesses and where your network is accessed from is critical to its continued security. A … Read More

Someone offers a tablet that reads "data security" with a pen to symbolize the need for Zero Trust to provide data security.

What is the Zero Trust Model

Zero Trust is a model for IT security in which access is only granted if the connecting devices and users are confirmed to be both authorized and authenticated. This is true regardless of the location of devices or their users. … Read More