Imagine IT (i)nsights

Imagine IT Insights

How to prevent VoIP threats

October 17th, 2018 Imagine IT password protection, 2018october17voip_a, encryption, firewalls, voip, vpn password protection, 2018october17voip_a, encryption, firewalls, voip, vpn

Now that digital collaboration is an integral part of any business, VoIP has become indispensable. Unfortunately, as it becomes more widespread, so do the threats against it. These attacks may not be as serious as ransomware or phishing, but they’re just as dangerous to SMBs. Here are five ways to protect your VoIP network against these threats.

Beware of watering hole attacks!

April 17th, 2018 Imagine IT 2018april17security_a, Security, security, cyberattack, intrusion prevention system, update, vpn, watering hole attack 2018april17security_a, Security, security, cyberattack, intrusion prevention system, update, vpn, watering hole attack

Hackers have plenty of ways to breach your systems. They can use complex programs to exploit software bugs, send emails to dupe you into downloading malware, or insert a malware-infected USB drive directly into your computer. However, another increasingly popular hacking method is a watering hole attack.

Can private browsing keep you safe?

March 27th, 2018 Imagine IT chrome, online privacy, opera, safari, security, 2018march27webandcloud_a, edge, firefox, private browsing, vpn, Web & Cloud, web browsers chrome, online privacy, opera, safari, security, 2018march27webandcloud_a, edge, firefox, private browsing, vpn, Web & Cloud, web browsers

Privacy is a precious commodity in this era. Every website you visit or app you download leaves a digital footprint that can be tracked by anyone. Fortunately, major web browsers all offer private browsing features to keep your internet activity somewhat safe from prying eyes.

Cybersecurity Essentials: VPN

December 6th, 2017 Imagine IT Security, 2017december6security_a, cybersecurity, encryption, ip leaking, privacy, server, virtual private network, vpn Security, 2017december6security_a, cybersecurity, encryption, ip leaking, privacy, server, virtual private network, vpn

Whether it’s because of government surveillance or cyberattacks, internet users are more concerned than ever about the privacy of their online activities. Unfortunately, security measures like firewalls and antivirus software can’t help you in this case, but there’s one that can: Virtual Private Network (VPN).

KRACK hacks: What you need to know

November 2nd, 2017 Imagine IT 2017november2security_a, patch, Security, ethernet, https, krack, public wifi, vpn, wifi, wpa2 2017november2security_a, patch, Security, ethernet, https, krack, public wifi, vpn, wifi, wpa2

You’ve heard of ransomware, denial-of-service attacks, and even phishing, but one hacking technique you may not have heard of is the KRACK exploit. This attack takes advantage of a vulnerability in WiFi networks, which puts any device with a wireless connection at risk. Here’s everything you need to know about KRACK.

Telecoms offering network virtualization

August 10th, 2016 Imagine IT 2016august10_virtualization_a, network virtualization, networks, database, servers, virtualization, vpn 2016august10_virtualization_a, network virtualization, networks, database, servers, virtualization, vpn

VoIP: 5 security tips for SMBs

May 23rd, 2016 Imagine IT security, 2016may23_voip_a, encryption, voip, vpn security, 2016may23_voip_a, encryption, voip, vpn