Basics of Bluetooth Low Energy (BLE)

BLE (originally introduced as Bluetooth Smart) is an extension to the Bluetooth 4 standard. It is important to understand that BLE does not replace Bluetooth, but instead it enhances Bluetooth. Bluetooth was defined under the IEEE 802.15 specification. 802.15 defines personal area networks for users and their devices. We commonly use Bluetooth for things like… The post Basics of Bluetooth Low Energy (BLE) appeared first on CCSI.
Read more

BYOD and Securing It to Protect Your Organization

BYOD, which stands for bring-your-own-device, is an important concept. With its supporting technologies it is accelerating telecommuting and collaboration in the workplace at a rapid pace. When selecting a BYOD strategy it is important to focus on some key areas. Understand your users’ needs. Establish clear policies. Define the discovery and enrollment process. Customize the… The post BYOD and Securing It to Protect Your Organization appeared first on CCSI.
Read more

How the Grinch (and his band of hackers) stole Christmas

In 2017 Hackers abound and we are all aware of it. However be aware that during the holiday season hackers are extra giving…of phishing attempts, malware, and Trojans, which all help them steal from you or your favorite retailer due to our laziness and lack of knowledge. Below are a list of a dirty dozen… The post How the Grinch (and his band of hackers) stole Christmas appeared first on CCSI.
Read more

Recent Wireless Vulnerabilities Made Public and Vendors Respond Quickly

Wireless is no longer something that we might use while staying in our hotel or sitting in the local coffee shop. Today mobile devices require ubiquitous wireless connectivity. That convenience can make our online experience better and faster. The prevalence of wireless access points everywhere we go has increased revenue for retailers and allowed us… The post Recent Wireless Vulnerabilities Made Public and Vendors Respond Quickly appeared first on CCSI.
Read more

Wireless Penetration Testing: What You Should Understand

Wireless is here to stay and becoming more and more pervasive. Understanding wireless and the risks and vulnerabilities involved with its use are crucial concerns for your organization’s security staff. We have all heard the horror stories associated with a company’s Wi-Fi used to breach their security. The most famous case is the TJ Maxx… The post Wireless Penetration Testing: What You Should Understand appeared first on CCSI.
Read more