May Cybersecurity Tip: Going Beyond the Firewall

A firewall protects against unauthorized access by scanning traffic and controlling what information can pass through the network. Since firewalls work by filtering traffic based on source and type, they won’t catch threats that come from a “legitimate" origin, such as:

Social engineering, including phishing attacks
Malicious websites disguised by an SSL certificate
Human error and the insider threat

Phishing emails, for example, often make it through a firewall, as email is considered normal traffic.

Should I Care #4 – Microsoft Windows 10

In the “Should I Care?” series we present topics that seem to be on the minds of many folks at the nonprofits with whom we work. In these blog posts, we’ll try to answer the basic question of whether it’s something you should care about or not and, if so, what you might want to do about it.

RoundTable is ranked 12th in the MSP 501 Global Ranking of the world's best technology service providers!Learn More