-
[2023 August Security Monthly Express] Zyxel firewalls support SafeSearch
SafeSearch, such as Google SafeSearch, is primarily designed to provide a safer browsing experience, especially in environments where users may want to avoid explicit or inappropriate content like workplace or educational environments. In ZLD5.37, Zyxel firewalls support SafeSearch from Google, YouTube, and Microsoft Bing…
-
[2023 July Security Monthly Express] How Zyxel keeps your IP surveillance devices secured
In the era of the Internet of Things, the security issues of networked devices are constantly being emphasized. Among them, the security issues of network cameras (IP CAM) are one of the most concerned devices. While enterprise networks may be a primary target due to their larger scale and potential impact, small and…
-
[2023 June Security Monthly Express] 7 Easy Ways to Reduce Your Attack Surface
7 Easy Ways to Reduce Your Attack Surface As securing your networks has always been Zyxel's top priority, our security experts constantly work on adding new features and collaborating with cybersecurity researchers to address and investigate potential security exploits that may affect our products. In this article, we…
-
[2023 May Security Monthly Express] A simpler approach to security & WiFi 6E
The ransomware attack is increasing Small businesses and teleworkers are facing numerous challenges in securing their networks and data in the new normal. Cyber threats like ransomware and malware can cause significant damage to a company's reputation, finances, and operations. Small businesses often struggle with finding…
-
[2023 May Tips & Tricks] See how Zyxel optimizes your VPN experience
What is a Route-based VPN? Route-based VPN is a type of VPN architecture that uses routes and policies to direct and control traffic between different VPN endpoints. In this type of VPN, the routing table is used to determine the best path for each packet of data, rather than relying solely on security policies. In a…
-
[2023 Mar. Security Monthly Express] Every Network Professional thinks “this security” is must-have
70% of Threats Can Be Stopped by Reputation Filter Service While running a daily business, it is possible to become a victim of a well-known cyberattack like WannaCry, botnets, Cryptojacking, and many more. Cyberattacks never stop and the risk spikes up when your network isn’t patched up. IP Reputation technology…
-
[2023 Mar. Tips & Tricks] SecuReporter Customized Report 2.0 Releases - I see. I analyze. I report.
At the end of 2022, Zyxel SecuReporter helped over 30,000 companies to monitor business networks worldwide. The SecuReporter team is committed to updating your report with the most advanced features so that you and your business can enjoy it! This latest release further enhances SecuReporter's report including: New cover…
-
[Tips & Tricks] Store system logs for you ATP/USG FLEX firewall on an USB stick
Store
system logs for you ATP/USG FLEX firewall on an USB stick One
best practice for IT professionals is to constantly keep track of logs, in case
you will need it for diagnostics of a particular system problem or network
issue. Simply
plug a USB storage disk into the USB port on the ATP/USG FLEX firewall, you’ll
get a…
-
[2023 Feb. Security Monthly Express] What is Sandboxing and Why Do You Need It?
Malware
is becoming more complicated, stealthy, and automated than ever. They can generate more
versions of a piece of malware faster than we can write definition forms which
would be the traditional way we do it. Every day, the AV-TEST Institute registers over 450,000 new malicious
programs (malware) and potentially…
-
[2022 Issue 10] Why browsers can be a security loophole?
Modern
browsers and latest operating systems are using new encryption technologies –
DNS over TLS (DoT) and DNS over HTTPS (DoH) – to combat against unauthorized
DNS services. It can be a great tool for privacy protection, but it would also open
up potential threats for your organizations and IT professionals. This…
-
[Tips & Tricks] Building Configuration Files Protection into Zyxel firewalls
There are several
configuration features on Zyxel security appliances that require some
protection. In ZLD5.35, the Zyxel firewalls are built with security in mind, by
adding an extra layer of password protection when the administrators want to
access the configuration files. How to enable Configuration
Files Protection?…
-
[Tips & Tricks] See how Zyxel can level up your IoT Security
What is IoT Security? IoT
Security is protection of the Internet of things and the network they’re in
from threats. It also monitors risks all while helping avoid vulnerabilities in
the devices that would cause security risks to your business. Security Risks to Your IoT
Network We
know the benefits and value IoT devices…
-
[2022 Issue 17] Why endpoint security is important? (Release Date: 2022-12)
Why
endpoint security is important? In
today’s world of rapidly evolving, tech staff are already under heavy
workloads, leaving little time to hunt down Endpoint threats from such as laptops,
desktops, smartphones, and tablets; they can all become potential attack
vectors, so that’s why it’s important to understand what…
-
[Tips & Tricks] Did you know USG FLEX now supports Reputation Filter?
As
you may know, USG FLEX already supports URL threat filters since the beginning
of the release. As part of our
commitment to providing you with better and more efficient protection services,
USG FLEX series now supports Zyxel Reputation Filter service, consisting of IP
Reputation, DNS threat filter, and URL threat…
-
[2022 Issue 16] Zyxel Threat Intelligence (Release Date: 2022-11)
ZyWALLs
latest virus/malware signature update protect you against more malware and
threats. See how ZyWALL
defends against these threats. Part 1 – Virus/Malware Spotlight Part 2 – Intrusion Detection Highlight Part 3 – Application Patrol Highlight This article focuses on Trojan.BitCoinMiner.
Part 2 and 3 will be included…
-
[2022 Issue 15] New and Thorough! USG FLEX Protection From Head to Toe!
New
and Thorough! USG FLEX Protection from Head to Toe! The business world as of today is still contemplating the
new reality of what a post-pandemic future might look like. Hybrid work models that allow employees to work from home or from
other places outside of office are welcomed as a change by many companies…
-
[Tips & Tricks] See how Zyxel resolves the WAN / LAN subnet conflict
The typical network
topology looks like the image below when we install a firewall into the network. Users directly connect the WAN port of the firewall
to an external ISP router using an Ethernet cable. What causes subnet conflicts? In cases of using the Zyxel USG FLEX/ATP firewall series,
the default setting of the WAN…
-
[2022 Issue 14] Key Cybersecurity News for H2 2022
Fast growing numbers of cyber attackers are
making it clear that threat attacks’ skills are continuously improving. Cybercriminals
seek to take advantage of the increased interest in mobile banking and
cryptocurrency investing. The FBI has claimed 244 victims and estimates the approximate
loss related to this activity to…
-
[2022 Issue 13] 7 Easy Ways to Narrow Your Attack Surface
Fast
growing numbers of vulnerability disclosures is making it clear that threat
attacks’ skills are continuously improving, and those exploits may bring down a
wide range of security perimeters. What’s worse is that security team is asked
to react quickly, and there is little tolerance from organizational decision
makers…
-
[2022 Issue 11] Why You Need an Endpoint Security Solution?
In today’s world of rapidly evolving Endpoint threats such as laptop, desktop, mobile phone, and tablet, are all popular attack vectors. The attacker not only can compromise the endpoint but also take advantage of employee’s identification, soak networks with malicious data, and steal private information. It is now more…