
Re-solution
118 FOLLOWERS
Get the latest news and insight from the team here at Re-solution.
Re-solution
21h ago
Checking your company’s cyber-security involves conducting a comprehensive assessment of your company’s digital infrastructure, systems, and practices. You can contact us here to arrange your free security audit.
Here are the key steps you can take to evaluate your company’s cyber-security:
Perform a risk assessment: Identify potential threats and vulnerabilities by conducting a thorough risk assessment. Assess your company’s assets, such as data, systems, and applications, and determine the impact and likelihood of various cyber-threats.
Review your security policies and procedures: Evaluat ..read more
Re-solution
3d ago
When it comes to networking equipment, Cisco has long been a leading provider, offering a wide range of solutions to meet the diverse needs of businesses. Two popular product lines from Cisco, Catalyst and Nexus, have gained significant attention in the networking industry. In this blog post, we will delve into the differences between Cisco Catalyst and Cisco Nexus, highlighting their unique features and advantages.
Cisco Catalyst: Powering Traditional Networks
Cisco Catalyst series has established its reputation as a reliable and robust solution for traditional network environmen ..read more
Re-solution
1w ago
Ensuring the security of your Network is crucial to protect your data and privacy. While achieving absolute security is challenging, there are several measures you can take to enhance the security of your network.
Here are some steps to help you assess and improve the security of your Network:
Use strong passwords: Ensure that all devices and accounts on your network have strong, unique passwords. Use a combination of upper and lowercase letters, numbers, and special characters. Avoid using easily guessable passwords or default credentials.
Password Access Lock Padlock Privacy Safety Concept ..read more
Re-solution
1w ago
Hackers have a reputation of being villains in the shadows, sitting behind their computer screens participating in cyber-crimes that can cost their victims millions, usually following the money is the best way to catch these hackers. So, of course with the invention of crypto-currency, you can bet that 99.9% of hackers want their ransoms in this form as it is untraceable! Or is it untraceable? We have quite a wild story for you…
The FBI and DarkSide hacker group
The FBI was able to retrieve a $2.3 million pay-out in Bitcoin that Colonial Pipeline had paid out to hackers. The cyber-criminal gro ..read more
Re-solution
1w ago
In today’s digital age, cyber-threats are becoming increasingly common, and businesses of all sizes are at risk. Cyber-attacks can cause significant financial losses, damage to your reputation, and even put your customers’ sensitive information at risk. That is why having effective cyber-security measures in place is essential for any business that wants to stay protected.
Here are some of the reasons why having cyber-security measures in place is so important:
Protecting Sensitive Data
One of the most critical reasons for having cyber-security measures in place is to protect your business’s s ..read more
Re-solution
3w ago
Wireless networks have become the backbone of modern communication and connectivity, powering everything from personal devices to enterprise-level systems. As technology continues to evolve, the next step in wireless networking is the adoption of Wi-Fi 6, also known as 802.11ax. In this blog post, we’ll explore why companies should upgrade their wireless networks to Wi-Fi 6.
Higher Speeds
One of the most significant benefits of Wi-Fi 6 is its faster speeds. With a theoretical maximum speed of 9.6 Gbps, Wi-Fi 6 is capable of delivering up to 40% faster speeds than the previous Wi-Fi ..read more
Re-solution
3w ago
We are back! Did you miss us?! We have some amazing updates for you! We have been super busy here at Re-solution HQ! Firstly, a couple of announcements and then on to some cyber-security facts!
Re-solution Renews their Cyber Essentials Certification!
Re-solution is delighted to announce that we recently renewed the Cyber Essentials certification.
Developed and operated by the National Cyber Security Centre (NCSC), the Cyber Essentials security scheme specifies five basic control areas (access control, secure configuration, software updates, malware protection and firewall and routers) en ..read more
Re-solution
1M ago
In today’s digital age, it’s crucial for businesses to protect their networks from cyber-attacks. With the increasing frequency and complexity of cyber threats, traditional firewalls are no longer sufficient. That’s where Cisco Next-Generation Firewalls (NGFWs) come in. Lets take a closer look at what Cisco NGFWs are and how they work.
What are Cisco Next-Generation Firewalls (NGFWs)?
Cisco NGFWs are a type of firewall that provides advanced threat detection and prevention capabilities beyond what traditional firewalls can offer. They are designed to protect networks against a wide range of th ..read more
Re-solution
1M ago
Firewalls are an essential component of any network security architecture, as they help protect against unauthorised access and cyber threats. Over the years, firewall technology has evolved significantly, with legacy firewalls being replaced by next-generation firewalls (NGFWs). In this blog post, we will discuss the differences between legacy firewalls and Cisco Next Generation Firewalls (NGFWs) and explore the benefits of using NGFWs.
Legacy Firewalls:
Legacy firewalls are traditional firewalls that use packet filtering to block or allow network traffic based on predefined rules. These rule ..read more
Re-solution
1M ago
Cyber-safety is important to protect yourself from online threats such as identity theft, fraud, hacking, cyberbullying, and cyberstalking.
Here are some guidelines for staying safe online:
Use strong and unique passwords: Use strong and unique passwords for all your online accounts. Avoid using the same password for multiple accounts. Consider using a password manager to keep track of your passwords.
Keep your software updated: Make sure your operating system, browser, and antivirus software are up to date. This will help protect you from known security vulnerabilities.
Use two-factor authe ..read more