paykasa bozdurma
Home > Support > Blog
Retailers Must Ensure the Security of In-Store Wi-Fi

Retailers Must Ensure the Security of In-Store Wi-Fi

An in-store Wi-Fi system is now an essential element of the retail shopping experience. Nearly 80 percent of all shoppers use a mobile device to search for product information while shopping in physical stores, according to a study by content management provider Salsify.

Wednesday, October 17, 2018/Author: Alex Jinks, Principal Engineer/Number of views (55)/Comments (0)/
Categories: Security Services
Tip and Tricks for Enhancing IoT Security

Tip and Tricks for Enhancing IoT Security

The Internet of Things (IoT) is expanding rapidly — as are the security and privacy risks associated with it. One recent study suggests that nearly 20 percent of organizations have already suffered distributed denial of service (DDoS) attacks by IoT botnets. Gartner analysts say security concerns are inhibiting growth of the IoT.

Wednesday, September 19, 2018/Author: Paul Truitt, CISO & VP, Cybersecurity/Number of views (149)/Comments (0)/
Categories: Security Services
3 Key Takeaways from the VPNFilter Threat

3 Key Takeaways from the VPNFilter Threat

In late May, malware known as VPNFilter began targeting routers from Linksys, Mikrotik, Netgear, QNAP and TP-Link, as well as network-attached storage (NAS) devices from QNAP. The malware operates in three stages. First, it is installed and maintains a persistent presence on the device so it can contact a command-and-control (C&C) server to download additional modules. 

Monday, June 25, 2018/Author: Luis R. Colon, CISSP, Information Security Manager/Number of views (207)/Comments (0)/
Categories: Security Services
How to Use a Password Manager to Implement Good Password Practices

How to Use a Password Manager to Implement Good Password Practices

We’ve previously discussed what not to do when constructing passwords. I put a stake in the ground at 14 printable ASCII characters for offline systems and 20 for systems accessible over the internet. (Remember that those are minimum numbers. I tend to default to 32 characters whenever possible). Couple this with a “no repeat” recommendation and most people’s brains are about to explode! 

Monday, June 11, 2018/Author: David Wynne, Cybersecurity Engineer/Number of views (217)/Comments (0)/
Categories: Security Services
Tags:
The Most Valuable Alert: A Security Analyst’s Perspective

The Most Valuable Alert: A Security Analyst’s Perspective

When setting up monitoring, many people look at the IT assets inside the organization and set up alerts to identify attackers coming after those precious resources. It’s certainly important to be alerted when, say, an unknown user is being added to a Domain Administrator group. It’s a serious threat that’s easy to detect and address.

Tuesday, May 08, 2018/Author: David Wynne, Cybersecurity Engineer/Number of views (402)/Comments (0)/
Categories: Security Services
RSS
12345678910 Last