June 2013

Beginners Guide to Firewall Terms - Part 2

A continuation of the previous blog post, these terms extend the description of the protective technologies that current firewalls are capable of.  

Unified Threat Management (UTM )

UTM protects from attacks, viruses, Trojans and other malicious threats by consolidating multiple network security features onto one platform.  This can include network firewall, intrusion detection/prevention, gateway anti-virus, etc.  UTM takes advantage of the current processing power available and improves security by integrating and centralizing protection.

Beginners Guide to Firewall Terms - Part 1

Some of the tech-talk related to network security can overwhelm of staff not steeped in the nuances of the burgeoning information technologies and ever-multiplying acronyms.  For small to medium sized businesses without the budgets to employ a full-time IT security professional, making the right choice on a firewall solution can be confusing. Even having the smallest grasp on some important firewall terms can help a small business owner make a better decision.  

Interpreting the 2012 Verizon Breach Report

Since 2004 the Verizon RISK Team has been tracking data and online security breaches on an annual basis, publishing an annual Data Breach Investigation Report (DBIR).  The 2012 report represents a collaboration of international government security agencies united in stifling the growth of online theft and crime.  The United States Secret Service, Dutch National High Tech Crime Unit, Australian Federal Police, Irish Reporting & Information Security Service, Police Central e-Crime Unit and London Metropolitan Police all combined to