<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=152771375339675&amp;ev=PageView&amp;noscript=1">

Security on the Wire

eWeek: "HOPZERO and 'Mission Impossible' - Where Data Self-Destructs"

/ by Bill Alderson posted in network security, hop value, internet security firewall, server security

0 Comments

It’s not often you find out your company has something in common with the classic show, Mission: Impossible.

Read More

Why Does Your Server Speak Russian? 

/ by Bill Alderson posted in network security, hop value, internet security firewall, firewall security

0 Comments

We all know how firewalls work; they prevent packets from passing through self-imposed barriers. But they don't limit how far packets go once they pass the threshold. 

The big question many U.S. organization database managers need to ask themselves is: is my server carrying high-value data to unfriendly countries? Firewalls are in place, but data is still leaking.

Is there anything else I can do to stop it?

Read More

Why "Less is More" When It Comes to Network Security

/ by Ben Haley posted in network security, hop value, internet security firewall, firewall security

0 Comments

Last week, Dark Reading published an analysis of 2017’s data breaches, and the results were quite bleak. 

Read More

Legacy Server Security Measures: When Firewalls Fail

/ by Bill Alderson posted in server security measures, server security, firewall, firewall security, internet security firewall

0 Comments

Takeaways:

• Legacy servers, those too cumbersome or expensive to replace, don’t have to be vulnerable to cyber-attack when firewalls fail to protect.

• Not all firewalls are created equal. In fact, as recent Cisco announcements proved, many firewalls are no longer supported with ongoing and evolving service.

• A change to a server’s HOPsphere radius is the best way to limit exposure and prevent the outside from getting in – or from the inside getting out.

They call them “legacy servers,” partially out of respect. The truth is, hackers have no respect for them, and these legacy servers are often highly vulnerable. Security professionals wonder: what are the best server security measures that can be applied to a legacy server?

Is it possible to defend these vulnerable legacy servers long before the hackers come hunting? And how can I secure a server with limited budget and time?

In this column, we dig into the issue of server security measures and we’ll outline how exactly you can protect your own legacy server.

Read More
Privacy Policy