


What Does HOP Count Mean? (and Other Important HOP Questions Answered)
If you’re involved in IT, you’ve probably heard of HOPs. But you might have asked yourself: What does HOP count mean? And why should you care?

Keeping Data on a Short Leash to Avoid Breaches
Even the best-trained dogs have leashes while in public. Despite how much one trusts their dog to act obediently, it simply is not possible to know what kind of situations one might encounter while on a walk—maybe an enticing squirrel? A loud noise? Another dog? Dogs...
How to Avoid the ‘Mousetrap Syndrome’ of Network Security
How do we protect our data? It’s a concern for millions around the world, from everyday users to leaders of international organizations and their security teams. We spend billions of dollars and man-hours every year, desperately trying to safeguard information. Like...
“It’s Not You; It’s Me”: Network Protection From the Inside-Out
Every enterprise network uses firewalls to restrict incoming traffic. These firewalls are amazing pieces of technology, building a powerful wall to keep intruders out — but all the defenses face outward.The soft spots — those areas most vulnerable — come from us,...
What the Antiquated Bank ATM Can Teach Us About Database Security
The antiquated ATM is an instructive metaphor for understanding the relationship between the web and your organization’s database server.
Recent Comments