Wifi Attacks Succeed Against All:WEP/WPA
When do Wifi attacks Succeed? It depends on your setup Some basics: First of all, change your default admin password (since default admin passwords are on the Internet so that…
Defend Your Systems
When do Wifi attacks Succeed? It depends on your setup Some basics: First of all, change your default admin password (since default admin passwords are on the Internet so that…
When we set up a Network we segment the network. The firewall protects the inside network, and the inside network critical systems are separated from the rest of the devices.…
If set up correctly your Firewall logs will tell you what is most important about your network, your employees, any trojans or viruses that are running in your network, etc.…
As other blog posts have mentioned in the past: Schneier: https://www.schneier.com/blog/archives/2013/01/people_process.html http://www.computerweekly.com/blogs/david_lacey/2013/01/we_need_more_use_of_security_t.html Here is the “Security Triangle” People, Process, and Technology. Image from: http://www.business2community.com/online-communities/social-intranets-merging-people-process-and-technology-0126252 Even though the image above is…
We are talking IT security risk – not financial or other security. IT security Risk – How to define it? Colors Green, Yellow, Orange, Red ? Numbers 12345 , or…