Security Q & A | Page 4

Web Filtering is one of your first lines of network defense, preventing known threats from reaching your network so your other security features can handle the unknown threats, and preventing users from accessing content that could be distracting, a drain on bandwidth, or a liability risk. Below is a collection of videos to introduce you to Web Filtering, using FortiOS 5.0. User-specific Web Filtering This video introduces you to the concept of web filtering, and provides an example of how it can be used to grant or limit access based on user... [Read More]
by RSS Jonah Davidson  |  May 08, 2014  |  Filed in: Security Q & A
Now that we've had a look at layered security, it's time to talk about each layer individually to figure out the steps you should take to secure your network. First and foremost is the DNS layer, the first "wall" of security that protects your network from attacks. DNS 101 Domain Name System (DNS) is used like a phonebook to help your computer find websites by translating a domain name to a website's IP address. For example, the domain name is translated to the IP address, which lets your computer successfully... [Read More]
by RSS Victoria Martin  |  Mar 03, 2014  |  Filed in: Security Q & A
Your FortiGate has just arrived. You've taken it out of its box and connected it to your network. All you need to do now is configure it to protect your network, which raises some questions: what features should you use, how should you use them, and most importantly, why? Before we get into the specifics, let's take a quick look at Fortinet's role layered security and how it can protect you. What is Layered Security? Layered security combines multiple security measures to make sure that you don't have all your security eggs in one basket. This... [Read More]
by RSS Victoria Martin  |  Jan 14, 2014  |  Filed in: Security Q & A
A: Email is totally insecure. Despite this fact, it is relied upon for some of our most critical personal and business communications. Circa 1980, The Simple Mail Transfer Protocol (SMTP) was designed without even a glimmer of what the internet would become. Security was not as paramount a concern as it is now; it never made it into the protocol. Changing this has been an uphill struggle due to the sheer number of mail servers and users who rely on them. Even today, by default, email is sent in plain text (if both servers do not already use... [Read More]
by RSS Carl Windsor  |  Nov 14, 2013  |  Filed in: Security Q & A
A: Reset your password and security questions, run a virus scan, and hope for the best. Beyond the basics, there are a few more considerations when your Gmail (or any other account for that matter) has been breached. Google offers two-factor authentication, enabling this should be one of your first steps. Two-factor authentication requires anyone logging into your account to not only know your username and password, but also retrieve a time sensitive token. This security token is usually a 5 digit number sent to your cell phone or your... [Read More]
by RSS Michael Perna  |  Oct 04, 2013  |  Filed in: Security Q & A
A: The simplest answer is to make yourself a difficult target. Best case practices like patch management and using a basic firewall are easy ways to prevent basic snooping. Having the most up to date patches installed can, more often than not, resolve a majority of basic security vulnerabilities. Patch management is as fundamental to your security posture as changing the oil in your car. Being proactive about it is the veritable low hanging fruit when it comes to filling in security cracks. Adding a basic firewall on your network can make... [Read More]
by RSS Michael Perna  |  Sep 25, 2013  |  Filed in: Security Q & A