Categories
Blog Posts

Firewall: Geoblocking

Today we’re discussing firewall geoblocking. You may have heard the term geoblocking while doing research on the next firewall or UTM device for your business. Geoblocking is a method used to block/restrict traffic from address ranges from getting through your firewall to your servers and your network. It’s also used to restrict traffic leaving your […]

Categories
Blog Posts

File Integrity

Lets start with answering the question of what is file integrity and why does it matter? Is this something you should be concerned with? File Integrity File Integrity is defined as a confirmed assertion that a file has not been altered unknowingly. Most people “trust” that their files on the computer or in the cloud […]

Categories
How-To

How To: Protect Old Data

Every few years, often on a schedule, businesses will replace their computer equipment. This usually happens when an equipment lease has come due, or the equipment is no longer suitable (age or performance), or it could happen because equipment has become more costly to maintain. Take steps to ensure you protect old data stored on […]