wonderfully unique software solutions

Devolutions highlights SMB tips for networking, PAM and cybersecurity

The ability of traceroutes to highlight latency and packet loss across routers and hops mean they’re still relevant in troubleshooting toolkits, according to an article published by SMB-focused access management specialist Devolutions.

Devolutions assigned space on its website to network performance vendor Obkio to explain the issues — offering tips and tricks for SMBs.

Alyssa Lamberti, writing for Obkio, argues that although many tools are available today, from speed tests to monitoring software, traceroutes still offer certain advantages.

“The hostname of the traceroute hops can provide a lot of information about the real path from the source to the destination,” she says.

“You can decode from traceroute DNS the ISP operating the router, the city where the router is located, the router name, number or unique ID, [and] the ingress interface or port through which the traceroute packet came on the router.”

Lamberti adds that people often forget that traffic on the internet is asymmetrical most of the time. To help troubleshoot issues further, traceroutes give you data from sources and destinations in the same ISP — providing a reverse traceroute to compare the data and catch reverse path issues.

A single router can drop traceroute packets or have higher latencies for various reasons, not necessarily pointing to network performance degradation. If the packet loss doesn’t continue with the following hops it’s not a network issue, says Lamberti.

“A traceroute traces the IP route from a source to a destination inside of an IP network. It collects data to show users the routers and round-trip latency from the source to each of the routers,” she writes.

A survey by Devolutions underlines that SMBs can be disadvantaged relative to large enterprises when it comes to optimisation even though they represent around 99% of all businesses.

For example, privileged access, password and remote connection management solutions can be expensive and complex for smaller firms — leaving them vulnerable to security and compliance issues.

The Canadian firm finds that perhaps 76% of SMBs don’t have a “fully deployed” privileged access management (PAM) solution, even though nearly eight in ten (78%) agree that PAM is important for cybersecurity. The full report can be downloaded here.

Sixty-two percent of SMB respondents indicated they audit their security setup less than once a year — with 14% never doing a security audit at all.

Many also allowed their end users to reuse passwords not only across professional accounts but also personal accounts, such as webmail.

David Hervieux, CEO of Devolutions, said that SMBs must not assume their smaller size will protect them from cyberattack.

“On the contrary, hackers, rogue employees and others are increasingly targeting SMBs because they typically have weaker and, in some cases, virtually non-existent defence systems. SMBs cannot afford to take a reactive wait-and-see approach.”

One way for SMBs to close the cybersecurity gap is to seek out a trusted managed service provider (MSP) for guidance and implementation of cybersecurity solutions, monitoring and training programmes, according to Devolutions.

(Photo by Possessed Photography on Unsplash)

Recent Articles

ShareGate explains Azure updates for Microsoft cloud users

Updates to Azure are adding up to "major improvements" in cloud governance and infrastructure efficiency, according to ShareGate's Xander Oortgiesen.

How a global pump manufacturer gains from OpenText’s content suite

Pump manufacturer Seepex says it is already seeing service improvements across a global customer base via enterprise content management from OpenText.

Intel targets edge computing and 5G services advances with Red Hat

Edge computing and 5G services are set for a boost from Intel announcements at the virtual iteration of the global Consumer Electronics...

Trojans, backdoor and malicious worm attacks target home workers

The proportion of Trojans as an overall share of malware detected leaped nearly 41% year on year during 2020, according to Kaspersky's...

Why no-code software could be key to the post-Covid business

'No code' software platforms might help businesses adapt as they scramble to emerge from the SARS-CoV-2 crisis this year, according to Smartsheet's...

Related Stories

Leave A Reply

Please enter your comment!
Please enter your name here

Weirdware monthly - Get the latest news in your inbox