3 Best Practices for Onboarding BYODs

3 Best Practices for Onboarding BYODs

Bring Your Own Device (BYOD) systems can be an amazing tool for businesses or schools looking to increase productivity and reduce cost. According to a study by Forbes, 42 percent of those ...
Image result for hacking attack image

It’s Time For SHA-1 Hash To End

SHA-1 is a commonly used cryptographic hash algorithm that has been used for nearly 2 decades to secure online communications. It was originally designed for government use, but an exploit was discovered ...
https://www.prismhr.com/wp-content/uploads/2018/05/banner-blog-ginny.jpg

Top 3 PEAP-MSCHAPv2 Mistakes Made by Universities

Credential-based authentication with PEAP-MSCHAPv2 is still commonly used, and for some network types it is appropriate. A home network or a small coffee shop offering free wireless can benefit from its convenience ...

The 3 Biggest Mistakes Universities Make with WPA2-Enterprise

Over the past decade, we’ve helped hundreds of organizations around the world secure and setup WPA2-Enterprise networks. While WPA2-Enterprise remains the golden standard for 802.1x authentication, there are many pitfalls an organization ...
This is how hackers hack you using simple social engineering

Stronger Multi-Factor Authentication With Certificates

It’s widely held knowledge that using a single factor for authentication to wireless networks is less than secure and easily exploited by hackers. Many organizations recognize this and utilize Multi-Factor Authentication (MFA) ...
certificates credentials

Digital Certificates vs Password Authentication

Businesses understand the importance of passwords for private data security, but might not realize that using a network with passwords poses many security threats. Every advancement in security technology is followed by ...
cyberthreats

Orchestrating Network Security to Handle Cyberthreats

Unfortunately for companies, cybercriminals don’t need to invent the wheel when choosing a way to hack corporate networks. Black hat hackers have a choice of cyberthreats and attack methods on a silver ...
Security Boulevard
SpongeBob SquarePants | Naughty Nautical Neighbours | Nickelodeon UK

Man-in-the-middle (MITM) attacks: explained

If you’ve ever watched this scene from Spongebob Squarepants, then you have a basic understanding of a man-in-the-middle (MITM) attack. How does a man-in-the-middle attack work? The attacker sets up rogue hardware ...

Addressing Theft Threats From All Angles

The post Addressing Theft Threats From All Angles appeared first on SecureW2 ...
Magecart-Style Website Supply Chain Attacks

Volunteer Project Takes Down 100,000 Malware Distribution Sites

A community of volunteer researchers has managed to take down around 100,000 malware distribution websites over the past 10 months as part of a new URL blacklisting project. The initiative, called URLhaus, ...
Security Boulevard