General

5a8300df8aa4169096932e433ec884b5

The Undervalued Security Benefits of IPsec

October 26, 2012 Added by:Rainer Enders

For too long, IPsec struggled with a reputation of being cumbersome to implement and manage. However, even amid the harshest of its critics, its ability to secure data has rarely, if ever, come into question. Now, through advancements in the technology's infrastructure, IPsec has become easy to use...

Comments  (0)

E85787adcaf7bca10e799cfd1cfd08f1

Five Ways BYOD can Harm your Company

October 02, 2012 Added by:Michelle Drolet

It’s becoming more and more common for workers to store work-related documents on devices they bring to and from work each day. While this can be convenient--employees can access important documents at home or on the road--it also creates greater security risks for businesses...

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

Wireless Network Security: A Beginner's Guide

August 02, 2012 Added by:Ben Rothke

The T.J. Maxx data breach was due to insecure wireless connectivity. Estimates of the costs for this security fiasco are a staggering $4.5 billion. Had the staff at T.J. Maxx had this book at hand and used it, they may have been able to save themselves a significant amount of money...

Comments  (0)

964eef19f95b77a2606d36daf6deb25f

Visualize Wi-Fi Networks Using Vistumbler and Google Earth

July 30, 2012 Added by:Dale Rapp

Vistumbler is an excellent free tool that scans for nearby wireless networks within range of your wi-fi adapter. Once Vistumbler finds a wireless network it will display the networks SSID, signal strength, encryption being used, mac address, the networks channel, access point manufacturer, and much more...

Comments  (4)

69dafe8b58066478aea48f3d0f384820

NSA Seeks Solutions for Secure Mobile Capabilities

July 23, 2012 Added by:Headlines

“First and foremost, our whole strategy from a classified mobility perspective is very much focused on commercial solutions for classified [communications]... It’s our intent that we would deliver, end-to-end, a solution that is reliant on all commercial components and we believe we can do that...”

Comments  (0)

964eef19f95b77a2606d36daf6deb25f

Security is Your Responsibility When Using Free Wi-Fi

July 17, 2012 Added by:Dale Rapp

Free wireless hot spots deliver a high-speed internet connection, but this convenient no hassle access to the internet comes with a lack of security. This doesn't mean you should avoid accessing a free wireless hot spot, it just means you need to be aware of how to protect your device when you do...

Comments  (0)

E595c1d49bf4a26f8e14ce59812af80e

Navigating the Minefield of Mobile Technology Purchasing

July 10, 2012 Added by:Patrick Oliver Graf

In organizations, there is a constant struggle between satisfying the technological needs of workers while maintaining an adherence to compliance and security. Remote access represents the next major iteration of this battle. This complexity also means there’s far more overlap between the pain points...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Law Enforcement Sought 1.3 Million Cell Phone Records in 2011

July 09, 2012 Added by:Headlines

“Law enforcement agencies are looking for a needle, but what are they doing with the haystack? We need to know how law enforcement differentiates between records of innocent people, and those that are subjects of investigation, as well as how it handles, administers, and disposes of this information..."

Comments  (0)

964eef19f95b77a2606d36daf6deb25f

Is Your WPA2 Protected Wireless Network Really Secure

July 01, 2012 Added by:Dale Rapp

A weak WPA2 passphrase could be hacked allowing an unauthorized person to use the wireless network. Even worse this unauthorized person could decrypt the communications revealing emails you send, web sites you visit, and passwords you use for access to websites...

Comments  (0)

37d5f81e2277051bc17116221040d51c

How Do I Protect Myself When Using Wi-Fi?

June 28, 2012 Added by:Robert Siciliano

Today, with criminal hackers as sophisticated as ever, if you are using an open unsecured network on your mobile device, you risk exposing your data. There are many ways for hackers to see who’s connected on a wireless connection, and to gain access to your information...

Comments  (0)

E313765e3bec84b2852c1c758f7244b6

Quick Wireless Network Security Reminders

May 29, 2012 Added by:Brent Huston

I recently tested a couple of Android network stumblers on a drive around the city and I found that not a lot has changed for consumer wireless networks since I last stumbled. There are still a TON of unprotected networks, default SSIDs and WEP networks out there...

Comments  (2)

68b48711426f3b082ab24e5746a66b36

Free Wi-Fi - Friend or Foe? An Infographic

May 25, 2012 Added by:Fergal Glynn

Did you know that this year the number of Wi-Fi connected devices will exceed the world’s population? This incredible statistic highlights the ubiquitous nature of Wi-Fi. However, the convenience of public Wi-Fi practically everywhere comes at the cost of greater risk to users...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Supreme Court Decision on GPS Surveillance Ripples

March 23, 2012 Added by:Electronic Frontier Foundation

The U.S. Supreme Court’s decision has been lauded as a landmark ruling and the FBI's own lawyer commented that it is perceived as a sea change within the FBI. And now its impact is starting to work its way through the judicial system as courts evaluate warrantless use of GPS devices...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Wireless Security: Wi-Fi Hacking Burglars Get Busted

March 22, 2012 Added by:Robert Siciliano

Once a Wi-Fi network was located through wardriving, the hackers remotely watched for information that revealed the network’s security setup and vulnerabilities. Police said they used sophisticated electronic equipment to break through networks with WEP protection...

Comments  (0)

37d5f81e2277051bc17116221040d51c

Security Tips When Providing Free Wi-Fi at Your Business

March 08, 2012 Added by:Robert Siciliano

Wi-Fi is great for bringing in customers and as a promotional tool that creates customer loyalty. Merchants such as hotels, coffee shops, burger joints and anyplace with a store front, chairs and tables is offering free Wi-Fi. But what about all the Wi-Fi security threats?

Comments  (0)

F29746c6cb299c1755e4087e6126a816

Twelve Security Best Practices for USB Drives

March 06, 2012 Added by:Kelly Colgan

Portable and mobile storage devices are significant players in most corporate offices. Ensuring proper protection with a best practices policy and strict enforcement offers significant risk reduction—and can prevent long nights on data breach investigations...

Comments  (1)

Page « < 1 - 2 - 3 - 4 - 5 > »