Five Tips for Protecting Your Email

Organizations are wary of the impact to their business due to spam, phishing and virus emails that enter their organization. I spend a considerable amount of my time with customers and partners discussing ways to […]

Ten Tips for Protecting POS Systems from Memory Scraping Malware

In the recently published 2015 SonicWall Security Threat Report, one of the observations on the evolution of attacks on POS systems is the rise in popularity of malware that uses memory scraping to steal sensitive data. […]

Beyond “Seven Layers”: Local Network Protection from Global Threats

Last week my colleague, John Gordineer posted a blog entitled “Seven layers of protection from hacked websites”. This blog goes further in examining how you can be protected from threats that can emerge from the […]

How Do We Live in Tomorrow’s World of Mobile Security?

BYOD is solvable. COPE is solvable. The rest of the acronym soup that describes problems associated with keeping company data safe while on mobile devices are solvable. But today, it takes several different solutions strung […]

SonicWall WXA 1.3 with Clustering for WAN Acceleration (WXA) Series Optimizes Bandwidth Utilization

There’s been talk in the U.S. recently about increasing broadband speeds which is good news for many. “As consumers adopt and demand more from their platforms and devices, the need for broadband will increase,” FCC […]

Facebook

Recent
Comments
Tags

This post is also available in: Portuguese (Brazil) French German Japanese Korean Spanish Chinese (Simplified)