The Top 8 Frankly IT Podcast Episodes of 2020
A lot happened this year—around the world and also on the Frankly IT podcast. We started 2020 as the show called Frankly MSP and kicked off the year with Frankly MSP Live in Santa Barbara, California,...
View ArticleThe Top 10 Auvik Blog Posts of 2020
In a year rife with change, one thing that stayed the same was Auvik’s publishing schedule. Every Tuesday at 9 a.m., you could always find a brand new blog post live on the website, no matter what...
View Article4 Predictions About What’s in Store for IT in 2021
If this past year has proven anything, it’s that making long-term predictions can be a challenge. After all, who would have predicted a large portion of the workforce would be fully remote and we’d be...
View ArticleThe Pros and Cons of VPN Split Tunneling
Split tunneling is a concept used with VPN technology, particularly for remote access VPNs. A VPN is a network “tunnel.” Your computer has a packet it wants to send to some remote device. It encrypts...
View ArticleNetworks at Risk Due to Widespread Gaps in Basic Network Management...
A significant portion of companies have vulnerabilities in their network management practices. These vulnerabilities include a lack of network visibility, configuration backups, proactive network...
View ArticleEvolving Your IT Skills in a SaaS World
Why SaaS could make your IT skills irrelevant. Headlines like this are scary, right? Well, that article was from back in 2008. Do you feel irrelevant? No, you say? That’s what I thought… There’s no...
View ArticleNetwork Discovery Software: Pros & Cons for 2021
Our current networking environments are accelerating the pace of change. The job of the network manager has become more complicated. There are many more devices to manage. There are more users and more...
View Article10 Best Network Monitoring Tools for 2021
There are plenty of options for network monitoring tools today, and that can make it hard to pick the right one for you. Here, we’ll help you sort through your options by taking a look at the 10 best...
View ArticleIncident Communication Is a Key Part of Resolving Network Issues
You’ve just received a notification—a major network issue has occurred. Hoping it’s a false positive, you complete an initial triage. Dang it! It’s the real thing. If you’re like me, your mind likely...
View Article11 Types of Networks: Understanding the Differences
As the number of connected personal and IoT devices skyrockets across the world, the demand for high-speed, high-performance networks continues to climb and transform how people and businesses connect....
View ArticleWhat Is Network Security?
What is network security? Network security is a combination of software, hardware, and human actions that protect your network from attack. What is network security? Have you ever been in the middle of...
View ArticleWhat Are Network Address Translation and Port Address Translation?
Network address translation (NAT) is very simple in concept. As packets pass through some network device—typically a firewall, router, or load balancer—either the source or destination IP address is...
View Article6 Best Network Traffic Monitor Software Options
Understanding how data flows across your network is a must for effective network management. But with network perimeters becoming more dynamic than ever before and nodes spread across the cloud, home...
View ArticleWhat Is Cloud Networking?
The future is bright for the cloud. In 2019, 90% of companies were already in the cloud and this impressive amount is expected to jump another 4% in 2021. And it gets even more interesting. By 2024,...
View ArticleLayer 2 vs Layer 3 Network Switches: What’s the Difference?
A network switch is a fundamental piece of any network, so it’s critical that you as an IT professional understand the role of a switch in a properly functioning network. And to best understand the...
View ArticleWhat Are the Types of Network Devices?
The term network device covers a lot of ground. Anything from a simple unmanaged switch to a dial-up modem to a UTM (unified threat management) appliance can fit the bill. Additionally, the lines...
View Article11 Network Traffic Terms to Know
Every industry loves its terms and jargon. Stop me if you’ve heard this one before: “I’ve always said that one of my core competencies is getting the most bang for my buck out of the sweat equity I put...
View Article5 Steps to Configure Cisco AnyConnect VPN
Because the world continues to work from home this year, I’ve had to configure Cisco AnyConnect VPNs on ASA firewalls for clients a few times. Unfortunately, the documentation from Cisco is extremely...
View ArticleHow to Draw Network Diagrams
Drawing a good network diagram isn’t hard to make, but it can be distressingly rare. Even network engineers with years of experience often draw network diagrams that are jumbled and hard to understand....
View ArticleSecuring Your DNS
When the Domain Name System (DNS) was created in 1983 I imagine its creator Paul Mockapetris and his team had no idea that nearly 40 years later our interconnected world would be so reliant on the very...
View Article