Archives - Network


Take advantage of quality of service (QoS) features on your network devices

Quality of service is a common feature of routers and other networking hardware that prioritizes some types of network traffic over others. This can be very useful if you have limited data speeds: Without QoS, data comes on a first-come, first-serve basis. Configuring QoS can sometimes be difficult, but many devices have presets you can […]

Know the security of your networking tech

Different pieces of technology often utilize unique security features. For example, you may know your way around your router’s security settings, but what if you use a powerline adapter or Wi-Fi extender? Whatever networking tech you have, familiarize yourself with how to use it safely for maximum peace of mind.

Multi-layer your company’s security

Apply multiple layers of defense to business networks to create a more secure network. Not only should this include using several different layers of security, but potentially more than one of the same type, too. Using more than one firewall, for example, means that you can partition different parts of the network behind different firewalls. […]

Verify you’re using HTTPS on shared networks

It may be only one letter, but there’s a big difference between HTTP and HTTPS in a URL. HTTPS encrypts all page and form data on the site in your using, making it crucial when employing sensitive applications like online banking. If you’re using Wi-Fi in a cafe, hotel or school, scanning for HTTPS is […]

Take a zero-trust approach to network access

Zero-Trust Network Access (ZTNA) uses the principle of least privilege that automatically defaults to the lowest level of access. In other words, when someone tries to access the business network, ZTNA will first verify their identity and apply permissions based on predefined rules created by the organization. In simple terms, users only have access to […]

Use a zero-trust approach to network security

If you manage an enterprise-grade network, you’re likely responsible for keeping sensitive corporate data under lock and key. When employees and outsiders access your corporate network, they could also potentially access unprotected data. Zero-Trust Network Access verifies the identity of a user before allowing them entry into the network – thus preventing unauthorized users from […]