Impulse News and Buzz

News from Impulse and Beyond

A man working at a laptop displaying a login screen with a shadowy figure in the background.

How Cybersecurity Varies Between Industries

Cybersecurity is a critical issue for modern industries, but some industries have different needs than others. This is due to factors that vary between industries like motivation, attack vectors, regulations and organizational structure. Learning about these differences may help organizations … Read More

Featured Post

Banks of All Sizes Should Prepare for Cyber Attacks

While cyber attacks on large international banks attract most media attention, small banks are also at risk. A study from the Ponemon Institute and Accenture found the average number of breaches per financial services company was 125 in 2017. In … Read More

Featured Post

Gartner Highlights Dell’s Use of SafeConnect

When considering IT products, it is often critical to choose products that can work with one another. Users of Dell EMC’s networking products should rest assured Impulse’s SafeConnect solution integrates so well with Dell’s networking products that the products’ ability … Read More

Featured Post

Five Tips to Prepare for a Cybersecurity Audit

Learn Impulse’s five tips to making cybersecurity audits as simple as possible. Plain Text Version 5 TIPS TO PREPARE FOR A CYBERSECURITY AUDIT Are you implementing and enforcing everything in your cybersecurity plan? To ensure your audit goes smoothly, here … Read More

Featured Post

How to Decide Which IoT Devices to Allow

Today’s smart devices allow us to do everything from change the temperature of our oven to find our car keys. But the potential security threat these devices pose is a serious matter. A Gartner survey found that almost 20 percent … Read More

Featured Post

How to Stop your K12 Students from Accessing Inappropriate Websites

Most schools receiving federal funding are required to block inappropriate websites. This is usually accomplished with content-control software, but some students use proxies to get around these restrictions. Fortunately, there are ways school administrators can limit access to inappropriate websites … Read More

Featured Post

How to Test Your Software’s Accessibility

Accessibility is not only a concern for physical spaces but virtual ones as well. Whether your organization has a software-based product or just a website, it’s important to consider software’s accessibility. 1.      Consider Legal Requirements Not only can inaccessible software … Read More

Featured Post

Purdue Blocks Streaming Sites to Maximize Bandwidth

Purdue University has a radical solution to its bandwidth problem: blocking streaming services from lecture halls. Blocked sites include Netflix, Apple Updates, iTunes, Hulu and Steam. What is blocked? The university blocked the aforementioned streaming sites from four of its … Read More

Featured Post

Recent Chinese Hardware Hack Emphasizes Network Segmentation’s Importance

With most of the world’s hardware manufactured in China, it was perhaps a matter of time before Chinese hackers exploited hardware to spy on government organizations. According to Bloomberg, this week marked the announcement of a hardware vulnerability implanted by … Read More

Featured Post