Below, I’ve summarized the most common issues we see during FortiGate audits for customers and in everyday operations. In practice, configuration errors with this popular firewall rarely stem from a lack of knowledge of network protocols, but more often from a misunderstanding of the FortiOS philosophy and the differences between local configuration and the one […]
Network segmentation is one of those solutions that everyone knows in theory, but in practice… things can be a bit different. In many companies, it still operates as “partially implemented” or “we’ll do it someday.” However, well-designed segmentation is the first line of defense against the effects of incidents, infrastructure chaos, and unplanned downtime. By […]
Wondering how to plan IT security when there are hundreds of solutions, and you’re just a one-person IT department or a small team? You look at your own company infrastructure and think, “Where do I begin?” The problem is that security architecture isn’t a single tool or a single recipe. Rather, it’s a map of […]
If you work in IT or networks, you’ve probably heard of the ISO/OSI model. It may seem like theory for students, but in practice, it’s the foundation for understanding how network communications work. Even if we talk about TCP/IP every day, the ISO/OSI model is still your guide for designing and troubleshooting. In the 1980s, […]
Understanding IP addressing, network masks, and subnetting is essential for anyone working with computer networks. In this guide, we’ll cover the fundamentals of IP addresses, subnet masks, address ranges, and how to design efficient IP addressing plans. What is an IP address and network mask? Every IP device with an IP address operates inside a […]
In an era of ever-increasing phishing attacks, increasingly sophisticated identity theft methods, and new regulations such as NIS2, the question is no longer whether MFA is worth investing in, but rather whether my organization can afford to continue to rely on outdated authentication methods? In this interview with Marcin Majchrzak, Sales Director for Yubico in […]
Have you ever forgotten your company email or VPN password? If so, you understand the frustration of trying to regain access. In a world where every system requires a different password – strong, long, and ideally unique – the average user becomes a credential juggler. The problem is that these juggles often end in… disaster. […]
A firewall is a key component of an IT security infrastructure. But even the best hardware and most advanced features won’t protect your network if they’re misconfigured. In reality, most threats stem not from a lack of a firewall, but from its incorrect use. In this article, we examine the most common firewall configuration errors, […]
Traffic generators Traffic generators can support the work of administrators in terms of testing and understanding their own network. Traffic generators allow you to find bottlenecks in the network, test new equipment for performance, and test monitoring systems. Traffic generators also allow you to check the behavior of network devices in terms of handling unusual […]
How can network security be ensured in the retail industry? What should be looked for to ensure even signal coverage? How can a properly designed network help achieve ESG goals? What about connection stability? Who is supposed to implement and operate all this? We will try to answer these questions in the following text on […]