Securing your Email – Understanding Public Key and Private Key Encryption
With Public Key Encryption, also known as asymmetric key encryption, two different keys, a Private Key and Public key are used simultaneously to both Digitally Sign and Authenticate an email message...
View ArticleSecuring your Email – Assigning and Using a Digital Certificate for Secure...
In order to use a Digital Certificate for Secure Email, you need to install the Certificate in to your specific version of Outlook and assign it to the correct profile. This is usually the default...
View ArticleSecuring your Email – Assigning and Using a Digital Certificate for Secure...
In order to use a Digital Certificate for Secure Email, you need to install the Certificate in to Thunderbird. Installing the Certificate is straightforward. Unfortunately, to use PGP – Public Key...
View ArticleSecuring the Home Network – Wi-Fi® Security
Most Cable and Phone Company Internet providers are installing Routers with Wi-Fi® capability. Unfortunately, not all Carriers take Wireless Security seriously. Many early Carrier Wi-Fi® Router...
View ArticleSecuring the Home Network – Guest Wi-Fi® Networks
The newest Wi-Fi® Routers support both a Primary “Private” and a Secondary “Guest” Wi-Fi® network. This allows you to have two separate SSID’s, (the names of your Wi-Fi® networks), at the same time....
View ArticleSecuring the Home Network – Show me your MAC ID please
Every network device has a MAC (Media Access Control) address. This unique twelve hexadecimal digit identifier is similar to either a phone number or social security number for your network equipment....
View ArticleSecuring the Home Network – Wi-Fi® Protected Setup™
Almost every modern day Wi-Fi® Router and Access Point supports Wi-Fi® Protected Setup™ which is an optional hardware method for quickly enabling security on a Wi-Fi® network. As you may recall, you...
View ArticleSecuring your Home Network – Close the Ad-Hoc Wi-Fi® Backdoor
In an effort to make data sharing easy, many Wi-Fi® devices support both Infrastructure Mode connections and Ad-Hoc peer-to-peer connections. Infrastructure mode is most common and is when a Wi-Fi®...
View ArticleIt’s 2013 – Do you know where your sensitive corporate data is?
Data File Security There was a time in the 1970’s through about 1995, before the modern Internet, when the person who managed your Information Technology could say with absolute certainty that he or...
View ArticleMobile Device Management – Containing The Mobile Invasion
Mobile Devices When Dorothy in the “Wizard of Oz” was walking through the Forrest, she exclaimed, “Lions and Tigers and Bears – Oh my.” Trust me when I say that most Information Technology Staff...
View Article
More Pages to Explore .....