Tech Corner / Cisco Security

Features and Functionalities of the Cisco IOS Zone-Based Firewall

Features and Functionalities of the Cisco IOS Zone-Based Firewall

In a typical enterprise deployment, different parts of the network usually represent different departments, floors, buildings, or anything that shares common characteristics.

Read Story

Ultimate Guide to Site-to-Site VPN Technologies on Cisco ASA

Ultimate Guide to Site-to-Site VPN Technologies on Cisco ASA - What You Need to Know about the Technology’s Basics and Benefits

Demand for secure communications over the internet rapidly grows daily within organizations. There’s no big surprise why. After all, CPO Magazine reported that the FBI reported about 847,376 cybersecurity complaints last year, representing almost $7 billion in business losses.

Read Story

What You Need To Know About Clientless Remote Access VPN

What You Need To Know About Clientless Remote Access VPN - Outlining the Pros and Cons for Your Organization

It’s a striking prediction: Kate Lister, president of Global Workplace Analytics, estimates that by 2025, around 70 percent of the workforce will work remotely at least five days per month.

Read Story

Must-Have Port Security: Simple but Efficient Layer 2 Protection

Must-Have Port Security: Simple but Efficient Layer 2 Protection

A switch port is the main entrance into a network and should have adequate security to combat potential threats. A large network could have thousands of access ports distributed across a campus or building. Are all your ports, used and unused, protected from unauthorized access?

Read Story

Telnet Versus SSH: How SSH Works and Why It's Better

Telnet Versus SSH: How SSH Works and Why It's Better

A Pew Research Center survey found that 54% of U.S. employees prefer working from home. Additionally, the current trends suggest that a hybrid or 100% remote work model will become a standard over the next few years. This model has meant that businesses have had to create remote conne …

Read Story

A Must-Have Guide - Risk-Free: Protect Against VLAN and STP Attacks

A Must-Have Guide - Risk-Free: Protect Against VLAN and STP Attacks

Securing the network is one of the most important tasks every engineer must consider to provide a safe networking environment. Although this task mainly focuses on protecting the network from outside attacks, such as from the internet, it also involves protection against less threaten …

Read Story

Fundamental Firewall Technology Principles: What Is a Firewall?

Fundamental Firewall Technology Principles: What Is a Firewall?

According to the Identity Theft Resource Center's Report, data breaches in 2021 increased by 68 percent, which equated to a record-breaking 1862 breaches. There's no wonder network security is top of mind across all business sectors.

Read Story

The Ultimate Guide to DHCP Spoofing and Starvation Attacks

What Are DHCP Spoofing and Starvation Attacks? A detailed overview

A Dynamic Host Configuration Protocol (DHCP) in a network is a common approach to allocating IP information dynamically to clients as they shift from one network to another within an enterprise.

Read Story

Subscribe by email