Net Sciences, Inc.
  • Facebook
  • LinkedIn
  • Call Now For IT Support In Albuquerque! 505-266-7887
  • 505-266-7887

Blog

Advanced Firewalling Six Easy Pieces

                      Introduction Modern UTM (unified threat management) firewalls provide far broader ...

Three Basics of Secure Wireless You Must Know To Protect Yourself

Let’s talk about the basics of secure wireless networking here. First, we’ll work with managing power and the placement of your access point (AP) or router in order to minimize its “signal leakage” to those outside the desired coverage area. Next up is ...

Advanced Firewalling Part Two – The Harder Stuff

Advanced Firewalling Part Two – The Harder Stuff Once you’ve done the easy stuff, like GEO IP filtering, Botnet filtering and setup Layer7 traffic handling (if your firewall has the capability to do so), the really good stuff is next. First ...

Advanced Firewalling Part One - The Easy Stuff

Part One – Advanced Firewalling Easy Stuff Modern UTM (unified threat management) firewalls provide far broader feature sets than mostbusinesses get around to using. These devices are simply configured for the Internet circuit (or circuits), setup with some basic remote access ...

Passwords Leave you Vulnerable. You May Need Two Factor Authentication (TFA).

Two Factor Authentication (TFA) - Beyond Passwords We all know that good passwords are complicated, should be different for every use and change frequently. We also know how hard that is to implement, enforce and track. So what do we do about ...

Password Security Fixed. Good, Better and Best Passwords.

Let's talk about password security. There are truly bad passwords, like your username, or “password.” There are better passwords, like “Mike04!” for example. And there really good passwords like #94hwer0n, but they often end up taped to your monitor or under the keyboard. ...

Network Security - Are You Taking it Seriously?

For network security, we are going to assume you’ve got a modern unified threat management (UTM) firewall doing deep packet inspection, assume you’ve got signature-based antivirus running on your servers, desktops and laptops, and assume you’ve got a comprehensive, managed ...

Phishing Tactic Targets Tabs

Phishing Tactic Targets Tabs

Mobile Apps in Business

ChannelPro consults Joshua Liberman on the business side of mobile apps in "Making Mobile Apps Click" Pg.22 ChannelPro Sept 2014

Basic Mobile Apps Security Issues

"Research firm claims that 75 percent of all mobile applications will fail basic security tests next year -- leaving the enterprise vulnerable." Article ...

Contact

Net Sciences, Inc.Net Sciences, Inc. Logo $$$
  • 2501 Alamo, SE
    Albuquerque, NM 87106
  • Phone: 505-266-7887
  • Phone: 505-266-7887

Social Media

  • Facebook
  • LinkedIn