The right way to build WiFi securely is to use already tried and true principles like a foundation of encryption with protocols designed specifically for WiFi.
101
Thwarting the Man-in-the-Middle
Do you know what a man-in-the-middle attack is? More importantly, do you know how to prevent one?
Creating Strong Password Policy Best Practices
Admins need to create and enforce strong password policies in their organizations, as well as educate their users on what constitutes a strong password.
3 Quick Facts on Why a Strong Password Policy Matters
73% of users have the same password for multiple sites, 33% use the same password every time creating an easy target for breaches and identity theft.
Automating Certificate Management: How SSL APIs Work
APIs combined with cloud-based certificate management and deployment services make certificate lifecycle management in the enterprise network easy.
5 Tips For Safe Cyber Shopping This Holiday
The holiday season is a wonderful time for so many reasons. Families get together, total strangers reach out to help those in need, and generosity and the spirit of giving is felt far and wide. But sadly, it’s also prime time for cyber criminals to steal your data. With that in mind here are five […]
5 More Cyber Security Tips to Stay Safe Online
Once again here is a weekly recap of safety tips as we near the end of National Cyber Security Awareness Month. Learn about security by design and put it into practice. Deploy dev servers for your test environments and keep logs so that you can avoid accidentally publishing vulnerable or incomplete code. Upgrade your legacy […]
5 Tips for Cyber Security Awareness Online
Better online security maximizes the benefit from digitally enhanced e-commerce, personal communication, community interaction, and content engagement.
10 Tips to Avoid Phishing Scams
They’ve become all too commonplace these days. Those pesky emails that flood your inbox, designed only to siphon your personal, private, and most sensitive information without you knowing. Some are easier to detect than others; if you get an email from a Nigerian prince looking for a place to store his fortune, for example, it’s […]