Steve Petryschuk

Steve Petryschuk

Steve Petryschuk is a director, network security and network management expert, and tech evangelist at Auvik. Known for his problem-solving prowess and hands-on approach, Steve has over a decade of experience in IT and network management. He specializes in identifying and resolving the challenges faced by network and IT administrators. A respected voice in the IT community, Steve is an active contributor to forums, a sought-after speaker, and a reliable adviser. His career, marked by roles ranging from IT security, technical sales and product strategy, reflects his deep understanding of both the business and technical sides of IT. Committed to constant learning and helping others, Steve embodies the Auvik Way, ensuring clients’ success and driving impactful changes.

See more from Steve Petryschuk

article
|
Protocols & Communication

SNMPv2 vs. SNMPv3: An SNMP Versions Comparison Table

The most significant difference between SNMP v2 and v3 is the level of security for the user on the network. Let’s look at an SNMP versions.
article
|
Protocols & Communication

What is QUIC? Everything You Need to Know

We’re diving into what the QUIC protocol is, how it works and how it’s used, and how it’s going to impact web traffic in the future.
article
|
Devices

Layer 2 vs Layer 3 Network Switches: What’s the Difference?

What’s the difference between Layer 2 and Layer 3 network switches and how critical are they to a properly functioning network?
article
|
Network Management

How to Find IP Addresses on a Network and Monitor their Usage

If you’re looking for a specific IP address, the simplest way to discover that device is to use the ICMP ping command. Typing in “ping ” with the addr
article
|
Protocols & Communication

Classful and Classless Addressing Explained

Of course, as anyone who has studied for a networking certification can tell you, there is a significant complexity increase between classful and clas
article
|
Network Management

NetFlow Basics: An Introduction to Monitoring Network Traffic

You probably have support for NetFlow or other flow protocols on your client devices already. That means you can quickly and inexpensively start gaini
article
|
Network Management

What is Network Congestion? Common Causes and How to Fix Them

Network congestion occurs when a node carries more data than it’s designed to handle. Learn how to fix common causes of network congestion.
article
|
Configuration & Troubleshooting

How to Troubleshoot Network Connectivity Problems With Auvik

Learn how to troubleshoot network connectivity problems. With the right software, problems can be solved in seconds. Get step-by-step help.
article
|
IT Leadership

Incident Communication Is a Key Part of Resolving Network Issues

Before you turn completely to resolving a network issue, there’s another important aspect to any resolution that you can’t forget, and that’s incident
article
|
Configuration & Troubleshooting

What is Network Optimization? 8 Reliable Techniques

Maintaining an optimized network requires a set of tools and techniques to ensure efficient bandwidth management, latency, and network load management
article
|
Network Management

3 Minor Network Alerts You Shouldn’t Ignore

It’s obvious you need to deal with emergency and critical network alerts. But what about simple warning alerts? Your first impulse may be to ignore th
article
|
Cybersecurity

What is Network Security?

Network security is a variety of different resources, behaviors, software, hardware components, and policies. The priorities and elements of network s
article
|
Protocols & Communication

What is 802.1X Authentication?

Want to understand network access control, and authentication 802.1X at the base layer? This article goes through all the ins and outs of 802.1X.
article
|
Configuration & Troubleshooting

Dealing with Rogue DHCP Servers

First, understand what a Rogue DHCP server is, how it works, and how it can threaten your network. Then, techniques to prevent them.
article
|
Network Management

What is Network Visualization?

Network visualization is a map of connected links, nodes, and other data points to show network paths between endpoints. Let’s review some examples.
article
|
Configuration & Troubleshooting

Network Segmentation: What It Is & How It Works

Learn how network segmentation compartmentalizes environments to limit blast radius, enabling granular access controls, visibility, and faster respons
article
|
Network Management

What is Network Management? Your Complete Guide

The ultimate guide to network management, the ongoing monitoring, administration, and maintenance of any networked system of computers.
article
|
Protocols & Communication

What is an ARP (Address Resolution Protocol) Table?

Let’s peer under the hood of how ARP tables help us see data similar to the “show arp” or “arp-a” command without having to open a terminal connection
article
|
Network Management

Network Diagrams 101: Definitions, Examples & How-To’s

Get tips for effective network diagramming with our expert guide. Explore why network diagrams are important, different types and how to draw.
article
|
Network Management

7 Best Network Infrastructure Mapping Tools

Network infrastructure mapping helps you maintain up-to-date maps for quickly diagnosing problems. Similarly, network maps can help everyone in your o
article
|
Configuration & Troubleshooting

Network Design and Best Practices

There’s no one size fits all network design. With the right approach, however, you can create a design that matches your business requirements. Of cou
article
|
Network Management

Best Network Discovery Tools of 2024

You can’t manage what you can’t see—when it comes to the network, you need full visibility & awareness. But you don’t need to spend days tracing wires
article
|
Network Management

What are the 7 Layers of OSI model

The OSI network model is an important conceptual reference used in network design and management. Its seven layers help IT professionals better troubl
article
|
Protocols & Communication

The Future of Private Addresses: Goodbye NAT, Hello IPv6

So how do we get from IPv4 to IPv6—which we all agree has to happen—when there’s still a raging debate about one of the biggest band-aids – Network Ad
article
|
Protocols & Communication

Top 6 VPN Protocols (And When to Use Them)

VPNs seem simple, but choosing the right type matters. Explore client-based vs. network-based VPNs and their optimal use cases.
article
|
Network Management

What is Cloud Networking?

Cloud networking taps into network resource availability in the cloud and complements or replaces traditional networking.
article
|
Devices

What Are the Types of Network Devices?

Understanding the types of network devices is vital to effective network management. Here, we take a look at 11 common network devices.
article
|
Network Management

The Importance of Network Topology Visualization

Network topology visualization can provide instant client context to service techs, speed up training time, expedite troubleshooting, avoid costly dow
article
|
Managed Service Providers (MSPs)

Weathering the IT Storm

With recession comments floating around, let’s take a look at what MSPs can do to reduce costs and remain profitable without sacrificing customer expe
article
|
Network Management

The Future of the Network is End User Experience. Are you Ready?

Don’t get me wrong—the world still absolutely needs all of the physical network devices, cabling, access points, etc. that connect us all. And there a
article
|
Network Management

How to Manage a Network: 10 Essential Steps

Managing a new network? Check out this list of 10 easy to follow steps from the experts at Auvik Networks to help you get started and be successful!
article
|
Network Management

Networking Automation Software: Pros & Cons

As network growth increases—and complexity along with it—we’ll need efficient and scalable ways to handle it. You simply won’t have the human resource
article
|
Configuration & Troubleshooting

Networking 101: What is a VLAN?

Do you really want all of these devices on the same LAN— all having equal access to the same set of resources? Should the IoT devices on my network, k
article
|
Network Management

5 Reasons to Add Network Monitoring to Your Budget

Allocating money in your IT budget for network monitoring in 2021 may be more important than ever. Here are five reasons why.
article
|
Network Management

What is ITAM? Guide to IT Asset Management

In the business world, information technology (IT) is everything. Without it, companies would struggle to keep track of their data and operations. How
article
|
Devices

Will Layer 3 Switches Give Routers the Boot?

A Layer 3 switch combines the capabilities of a Layer 2 switch and a router in one device. Does this mean the death of the router is imminent? In shor
article
|
Configuration & Troubleshooting

Preventing Network Configuration Drift

A cynical network engineer might say, “configuration drift happens when you take the day off.” Someone changed something they shouldn’t have, and didn
article
|
Network Management

Distributed Healthcare Network Monitoring is Possible (with the Right System)

A single healthcare network monitoring system is one of the most effective solutions for improving the management of distributed and diverse networks,
webinar
|
Network Management

Cloud-Native Applications: The Risks and Rewards for MSPs

Your clients want the freedom of cloud-based collaboration and productivity tools. As an MSP, you want a business-grade solution to security and data
webinar
|
Network Management

Network Troubleshooting Tips for MSPs

From smart light bulbs taking down a network, to technicians locked in a closet on site, you won’t want to miss this recap of some of our favorite net
article
|
Network Management

Supporting Remote Workers with Auvik During (and after) COVID-19

During the COVID-19 pandemic, network performance needs to be rock solid so users can access the resources they need, when they need them. Here’s how
article
|
Network Management

The Kids are Connected: Ensuring Connectivity in Education Networks

Connectivity is more important than ever to support our education system. BYOD, remote classes, Wi-Fi, and a variety of digital learning solutions are
article
|
Configuration & Troubleshooting

How Not to Break Your Network With Updates

Given the risks, you can’t blame the paranoid network engineer that doesn’t want to change or update anything. The problem is that change is necessary
article
|
Network Management

The Challenge of Monitoring a Distributed Network

What exactly makes a network distributed? Is a distributed network fundamentally different from a decentralized network? And if they are different, ho
article
|
Network Management

Using DNS Filtering to your Advantage

DNS filtering is the use of DNS to block or allow access to specific content through the use of DNS requests. While technically you can use DNS filter
article
|
Network Management

Your Guide to IP Address Management

IPAM (IP address management) is critical software to help ensure seamless connectivity and much more. Learn what it is and how it can help your networ
article
|
Protocols & Communication

The What and The Why of TLS Inspection

Let’s look at what the process of a secure connection through TLS entails, how it can be used to see past “invisible traffic” and help your firewall
article
|
Tech Industry

Careers at a Crossroad: Staying Technical vs. Heading into Management

Trying to decide between staying in a technical IT role, or moving into a management position? There might be value in either path. Let’s look at some
webinar
|
Network Management

Secure IT Operations

Watch the Secure IT Operations webinar, where we bring IT Ops and IT Security together and discuss what you can do to address two of the biggest strug
article
|
Devices

Network Firewall Security: Monitoring Firewalls 101

Configuring your firewall security manager is essential to maintaining the health and safety of your network. Learn the key routines for this critical
article
|
IT Leadership

Network Integration: Moving from Reactive to Proactive with Mature Processes

Learn how network integration can help you identify and solve problems quickly and move from reactive to proactive in your work. Hosted by Auvik and C
article
|
Network Management

Network Throughput vs Bandwidth and How to Measure It

Learn everything you need to know about network throughput from the experts at Auvik Networks. And while we’re at it, let’s cover the fundamentals of
article
|
Cybersecurity

Securing Your DNS

Why does DNS security matter, and what are some security options available to help protect your network from DNS data attacks?
article
|
Network Management

11 Network Traffic Terms to Know

Monitoring network traffic is important—but first you need to understand the basic terms and concepts. Here are 11 key network traffic terms to know.
article
|
Network Management

Evolving Your IT Skills in a SaaS World

Here’s how to evolve your IT skills as the adoption of SaaS—and XaaS (everything as a service)—continues.
webinar
|
Network Management

From Putting Out Fires to Proactive Monitoring: Processes for Managing Your Network

Whether you’re the one managing the network yourself or you’re leading the team who does, you know how frustrating it is when you spend hours addressi
article
|
Network Management

How COVID-19 Changed Our Internet Habits

COVID-19 has us all spending more time in front of screens & has changed the way we use networks and the internet. Here’s what it means for IT pros.
article
|
Network Management

How to Keep IT Infrastructure Devices Fresh and Fit for Purpose

Old, unused network devices create security risks, eat up IT time, and bloat operating costs. Here’s how to keep IT infrastructure fresh & fit for pur
article
|
Network Management

VPN Monitoring: Keeping Remote Workers Connected With Auvik

Managing a lot of remote workers right now? Here’s how to use VPN monitoring to stay on top of capacity issues and keep workers connected.
webinar
|
Network Management

Achieving Higher Profit Margins by Selling Security-as-a-Service

Cyberattacks are on the rise, but security spending isn’t keeping up. Learn how selling security-as-a-service can boost your MSP’s profit margins.
article
|
Cybersecurity

What Is Two-Factor Authentication and Why Is It Important?

Two-factor authentication or 2FA requires a user to identify themselves in two ways—or using two different methods—before allowing them to access an a
article
|
Cybersecurity

Network Device Security: Guide and Best Practices

Network device security is one of the most important elements of network management. Learn what it is and best practices to follow.
webinar
|
Network Management

Grow Your Revenue in 2019 with Network Assessments – Webinar (On Demand)

Network assessments are an effective way to demonstrate the value of your managed network services to prospects. Whether you charge for the assessment
article
|
Devices

Why Your Client’s Firewall May Not Be Up to the Task of Network Security

A new Sophos report reveals IT pros can’t identify almost half (45%) of the traffic flowing through their networks. That’s a massive blind spot, espec

What’s your shadow IT risk factor?

Find out in this free guide and exercise kit.
cover of shadow IT ebook
You will learn:
  • The impact shadow IT has on an organization
  • How to evaluate tools
  • Tips on security
  • A quiz to help you determine the severity of shadow IT in your org
  • Solutions to solve these problems