wonderfully unique software solutions

Devolutions highlights SMB tips for networking, PAM and cybersecurity

The ability of traceroutes to highlight latency and packet loss across routers and hops mean they’re still relevant in troubleshooting toolkits, according to an article published by SMB-focused access management specialist Devolutions.

Devolutions assigned space on its website to network performance vendor Obkio to explain the issues — offering tips and tricks for SMBs.

Alyssa Lamberti, writing for Obkio, argues that although many tools are available today, from speed tests to monitoring software, traceroutes still offer certain advantages.

“The hostname of the traceroute hops can provide a lot of information about the real path from the source to the destination,” she says.

“You can decode from traceroute DNS the ISP operating the router, the city where the router is located, the router name, number or unique ID, [and] the ingress interface or port through which the traceroute packet came on the router.”

Lamberti adds that people often forget that traffic on the internet is asymmetrical most of the time. To help troubleshoot issues further, traceroutes give you data from sources and destinations in the same ISP — providing a reverse traceroute to compare the data and catch reverse path issues.

A single router can drop traceroute packets or have higher latencies for various reasons, not necessarily pointing to network performance degradation. If the packet loss doesn’t continue with the following hops it’s not a network issue, says Lamberti.

“A traceroute traces the IP route from a source to a destination inside of an IP network. It collects data to show users the routers and round-trip latency from the source to each of the routers,” she writes.

A survey by Devolutions underlines that SMBs can be disadvantaged relative to large enterprises when it comes to optimisation even though they represent around 99% of all businesses.

For example, privileged access, password and remote connection management solutions can be expensive and complex for smaller firms — leaving them vulnerable to security and compliance issues.

The Canadian firm finds that perhaps 76% of SMBs don’t have a “fully deployed” privileged access management (PAM) solution, even though nearly eight in ten (78%) agree that PAM is important for cybersecurity. The full report can be downloaded here.

Sixty-two percent of SMB respondents indicated they audit their security setup less than once a year — with 14% never doing a security audit at all.

Many also allowed their end users to reuse passwords not only across professional accounts but also personal accounts, such as webmail.

David Hervieux, CEO of Devolutions, said that SMBs must not assume their smaller size will protect them from cyberattack.

“On the contrary, hackers, rogue employees and others are increasingly targeting SMBs because they typically have weaker and, in some cases, virtually non-existent defence systems. SMBs cannot afford to take a reactive wait-and-see approach.”

One way for SMBs to close the cybersecurity gap is to seek out a trusted managed service provider (MSP) for guidance and implementation of cybersecurity solutions, monitoring and training programmes, according to Devolutions.

(Photo by Possessed Photography on Unsplash)

Recent Articles

How remote connectivity can empower education – with RealVNC

Simplified classroom management, effective communication, and cost-effectiveness are desirable in education institutions from schools to universities, with digital solutions for distributed learning...

ShareGate answers questions on Copilot and M365 sprawl

Microsoft 365 (M365) with Copilot broadens and deepens capabilities that can enhance productivity in multiple ways but can also increase sprawl and...

Steel company deployed CoreView to head off potential delays post-acquisition

When integrating M&A driven expansion, Italian steel processing firm Marcegaglia implemented CoreView to minimise potential account migration problems from confusion to data...

Delinea meets ransomware comeback with acquisitions, further innovation

Cybercriminals appear to have doubled down on ransomware attacks again in the year, with a stealthier approach evident as well as a...

SCORM compliance and why it matters for e-learning

Learning management systems (LMS) and e-training content that comply with the Shareable Content Object Reference Model (SCORM) help ensure consistency across corporate...

Related Stories

Leave A Reply

Please enter your comment!
Please enter your name here

Weirdware monthly - Get the latest news in your inbox