<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1703665079923990&amp;ev=PageView&amp;noscript=1">

BLOG

vshape_NewWhite

Infogressive Blog

WHITEBOARD WEDNESDAY: Flat vs Segmented Networks

The fact is, there’s a right way and wrong way to deploy a firewall in a network. Positioning your firewall correctly could make all the difference if a malicious actor were to obtain access to a workstation in your environment.

Follow along in this week’s Whiteboard Wednesday video as our CEO, Justin Kallhoff, discusses the differences between a flat and segmented network. 

Posted on July 12, 2017

Pros and Cons of SSL Encryption

People familiar with Hypertext Transfer Protocol Security (HTTPS) know it protects online activities and communications by applying Secure Sockets Layer (SSL) encryption to web traffic. This is a benefit to organizations that need to shield private data from exposure. And what organization doesn’t?

Posted on January 18, 2017

5 Ways Infogressive Protects Your Castle with Managed Security Services

It seems that our newsfeeds are constantly flooded with the headlines of the latest cyber attack. Wishing it away or hoping that our news filters were malfunctioning, is just not possible. Sadly, it is due to the fact that these crimes are happening more frequently than ever before. 

Posted on November 17, 2016

The One Thing All Secure Networks Should Have in Common

The days of dividing your firewall up into three primary zones, inside, outside and DMZ are fast coming to an end. Security standards such as PCI-DSS, HIPAA, NIST and a host of others all suggest the use of segmentation in order to protect critical systems.

Posted on May 23, 2016

Ransomware Costs Hollywood Presbyterian Medical Center $3 Million

Infogressive’s Jeff Murphy provides feedback from SC Magazine’s article “Ransomware goes to Hollywood medical centre.”

For Hollywood Presbyterian Medical Center to have paid out over three million dollars in ransomware and suffered a week of down time indicates a less than stellar cyber security posture. 

Posted on February 17, 2016

Prepare for the Hunt: Five Practical Tips to Make Log Analysis Less Miserable with Fortinet

Log analysis. It’s a thing. First reactions are probably going to be “Yuck,” “Make the new guy do it,” “Insert expletive here,” or the more common “Why? What broke now?”

Posted on January 13, 2016

TOP ARTICLES:

QUESTIONS?