281.651.2254 sales@securenetworkers.com
  • Facebook
  • Twitter
  • Instagram
  • RSS
  • Facebook
  • Twitter
  • Instagram
  • RSS
  • CAPABILITY STATEMENT
  • Goldman'Sachs 10,000 Small Businesses
  • Texas Department of Information Resources DIR
  • CUSTOMER PORTAL
Secure Networkers
  • Home
  • Team
  • Services
    • IT Security
    • Managed Services
    • Cloud Hosting
    • Backups and Remediation
    • IT Solutions by Industry
  • Partnerships
    • Cisco Meraki
    • Cisco Systems
    • Cisco Webex
    • Dell
    • Fibertown
    • Microsoft
    • StorageCraft
    • VMWare
  • DIR
  • Resources
    • Affiliations
    • Blog
    • Demos
    • Events
    • Insights from Engineers
    • Utilities
    • Video
    • White Papers
  • Contact Us
Select Page
Secure Networkers IT News Brief September 2019

Secure Networkers IT News Brief September 2019

by Katherine Parker | Aug 30, 2019 | Data Security, Email Environment Security, Intrusion Prevention, Network Security, Network Visibility, Role-based Access Control (RBAC), Uncategorized

IT News Brief September 2019:  This month we focus on the importance of an annual Network Health Check, and the five main areas of attention for a health check to be complete. We also discuss some of the tools necessary to make network maintenance smooth and...
Do you have intrusion prevention and URL filtering?

Do you have intrusion prevention and URL filtering?

by Katherine Parker | Aug 27, 2019 | Intrusion Prevention, Network Security, Network Visibility, Uncategorized

Complete network security requires many layers, one of the most important being intrusion prevention. If you have a firewall protecting your system and think it is enough, think again: A firewall is an important ingredient, but it is not the whole recipe for...
Are you using Multi-Factor Authentication?

Are you using Multi-Factor Authentication?

by Katherine Parker | Aug 16, 2019 | General Information, Network Security, Uncategorized

We have touched upon the subject of multi-factor authentication a bunch lately. It has become such an important part of security hardening. Enforcing multi-layered authentication of the identity of users accessing your network is recommended so strongly now because:...
Verify proper permission levels for each user in your organization.

Verify proper permission levels for each user in your organization.

by Katherine Parker | Aug 13, 2019 | General Information, Network Security, Role-based Access Control (RBAC), Uncategorized

There is nothing more frustrating in the network security business than to see a business network with administration permissions granted to a random bunch of employees. When we say “random,” it is because it is rather common to see that administration access...
Have you turned off Remote Desktop Protocol (RDP) on Your Server?

Have you turned off Remote Desktop Protocol (RDP) on Your Server?

by Katherine Parker | Aug 12, 2019 | General Information, Network Security, Uncategorized

Remote Desktop Protocol (RDP) was one of those nifty features meant to make computing troubles so much easier to fix. If a software failed to work, a quick call to technical support, followed by a tech temporarily taking over your desktop to find the problem and fix...
« Older Entries

Recent Posts

  • IT News Brief April 2021
  • Virtually Secured SMBs
  • IT News Brief March 2021
  • Disaster Preparedness: Surviving the Ice Storm

Categories

  • Architecture and IT Strategy
  • Backup Testing
  • Backups
  • Cloud Computing
  • Cloud Exit Plan
  • Collaboration Technology
  • Cyberattack
  • Cybersecurity
  • Data Breach Response
  • Data Protection Laws
  • Data Security
  • Device Security
  • Digital Transformatino
  • Digital Transformation
  • Disaster Recovery
  • Disaster Response
  • DNS Filtering
  • Domain Name Registration
  • Education Industry IT
  • Email Environment Security
  • Endpoint Security
  • Firewall
  • General Information
  • Hacker Prevention
  • Incident Response Plan
  • Infographics
  • Informaton by Industry
  • Intrusion Prevention
  • Malware
  • Malware Incident Response
  • Managed Security Service Provider
  • Mobile Devices
  • MSSP
  • Natural Disaster Preparedness
  • Network Health Check
  • Network Remediation
  • Network Security
  • Network Visibility
  • Overview
  • Password Security
  • Penetration Test
  • Private Cloud
  • Remote Access
  • Role-based Access Control (RBAC)
  • Rootkit
  • Runbook
  • Secure Data Storage
  • Uncategorized
  • Virtual Desktop Infrastructure (VDI)
  • Virtual Private Network (VPN)
  • White Papers
  • White Papers on Accountant and Business Finances Solutions
  • White Papers on Cisco Firepower
  • White Papers on Cisco Meraki Solutions
  • White Papers on Cisco Systems
  • White Papers on Cisco Webex
  • White Papers on Healthcare IT Solutions
  • White Papers on Law Firm Data Security
  • White Papers on Technology that Automates

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

SEARCH

Search Our Solutions

  • IT Security
  • Managed Services
  • Cloud Hosting
  • Backups and Remediation

Search Our Partners

  • Cisco Meraki
  • Cisco Systems
  • Cisco WebEx
  • Dell Partner
  • Fibertown
  • Microsoft
  • StorageCraft
  • VMWare

Resources

  • Affiliations
  • Blog
  • Demos
  • Insights from Engineers
  • Utilities
  • Video
  • White Papers

Certifications

Cisco Firejumer Pros Located Here!

FIRE JUMPER PROS LOCATED HERE!

Connect With Us!

(281) 651.2254
ALL CONTACT INFO
CUSTOMER PORTAL

Distinctions

Goldman'Sachs 10,000 Small Businesses


HUB ID: 1272954107300

DIR contract holder for all Cisco Solutions

 

Contract Number: DIR‐TSO‐4252

  • Facebook
  • Twitter
  • Instagram
  • RSS
Copyright © 2010 – 2021. All Rights Reserved.