Let’s talk about the basics of secure wireless networking here. First, we’ll work with managing power and the placement of your access point (AP) or router in order to minimize its “signal leakage” to those outside the desired coverage area. Next up is WPA2 encryption, and finally, we’ll address MAC address filtering. Interestingly, until recently it was believed that…Details
Recently, Verizon was caught tampering with its customer’s web requests to inject a tracking super-cookie. Another network-tampering threat to user safety has come to light from other providers: email encryption downgrade attacks.
Advanced Firewalling Part Two – The Harder Stuff Once you’ve done the easy stuff, like GEO IP filtering, Botnet filtering and setup Layer7 traffic handling (if your firewall has the capability to do so), the really good stuff is next. First on the list, assuming your firewall can do it, comes SSL DPI traffic scanning (scanning of…Details
Part One – Advanced Firewalling Easy Stuff Modern UTM (unified threat management) firewalls provide far broader feature sets than mostbusinesses get around to using. These devices are simply configured for the Internet circuit (or circuits), setup with some basic remote access functionality and configured to support a wireless network or two, if they have that capability. Otherwise,…Details
Two Factor Authentication (TFA) – Beyond Passwords We all know that good passwords are complicated, should be different for every use and change frequently. We also know how hard that is to implement, enforce and track. So what do we do about this? Two factor authentication (TFA), which combines your username and password with something you have (tokens)…Details
Let’s talk about password security. There are truly bad passwords, like your username, or “password.” There are better passwords, like “Mike04!” for example. And there really good passwords like #94hwer0n, but they often end up taped to your monitor or under the keyboard. Not so good. So how should we handle password security in our world of hackers and…Details
For network security, we are going to assume you’ve got a modern unified threat management (UTM) firewall doing deep packet inspection, assume you’ve got signature-based antivirus running on your servers, desktops and laptops, and assume you’ve got a comprehensive, managed patching system in place that covers both Microsoft and third-party patches for servers, desktops and…Details