Eric Geier Avatar
  • Using Wi-Fi Security on Mobile Phones and Devices

    If your smart phone, Android tablet, or iPad has become a part of your daily business or computing life, you should take its security just as serious as you do with your desktop or laptop computers since mobile devices are so much easier to misplace or become stolen. You could lose all your contacts, calendar […]

  • How to Securely Manage Wi-Fi on Smart Phones and Tablets

    Unfortunately, there’s more to mobile security than the data you store. If your mobile device has Wi-Fi capability and you connect to unsecured Wi-Fi hotspots for Internet access without knowing it, there are more security concerns. Even worse, mobile devices don’t incorporate security features to directly combat Wi-Fi threats. The first thing to know is […]

  • How to Protect an Entire Network with Untangle

    As you’re likely aware, guarding your PCs from malware – viruses, trojans, spyware – and hacking is crucial for protecting your files and data. However, don’t forget about your mobile devices. Malware and hacking will be becoming more prevalent on smartphones, pads, and tablets. This makes network-wide security protection even more beneficial. It can cover […]

  • How to Erase Your iOS Device

    Security shouldn’t stop at your computer. Your mobile phones and devices are actually more vulnerable to become lost or stolen, and they can contain just as much personal and sensitive data. Before you sell, trash, or send them off for repair, you should wipe them clean of your personal information. In addition, you should enable […]

  • Pushing 802.1X Settings to iPhones, iPod Touches, and iPads

    If you’ve implemented WPA or WPA2 Enterprise encryption for your Wi-Fi network, you probably know too well that it isn’t easy to configure the 802.1X settingson clients of a corporate or campus network. Even setting up Windows computers can be a pain, not to mention Mac OS X or Linux machines. Configuring and supporting mobile […]

  • How To Encrypt a Windows Drive with DiskCryptor

    Encrypting your documents protects them from prying eyes if your computer becomes lost or stolen. However, you shouldn’t stop at just encrypting your sensitive documents. A thief can recover passwords and other sensitive information stored by Windows. Even if you password-protect your Windows account, your system files can still be easily accessed, for example, from […]

  • 15 Reasons to Use Enterprise WLAN Security

    The Enterprise mode of Wi-Fi Protected Access (WPA or WPA2) encryption uses 802.1X authentication to provide better security for wireless networks. This mode should be used by all businesses and organizations (no matter how small) rather than the Personal or Pre-Shared Key (PSK) mode. There are myriad reasons why your business’s Wi-Fi network should be […]

  • How to Use Enterprise Wi-Fi Encryption and 802.1X in Mac OS X

    In this tutorial, we’ll see exactly how to configure and connect to WPA/WPA2-Enterprise networks in 10.5 Leopard and 10.6 Snow Leopard. A quick note about the screen shots: they are taken from 10.5; some windows differ in 10.6. Quickly connecting to an 802.1X network First, let’s see how easy it is to connect to an […]

  • How to Wipe a Computer Clean

      Before you sell or get rid of your computers—whether working or not—you should clean them of sensitive documents and data. To be completely safe, you should do this even if you plan on keeping them around in your garage or a closet. You never know who will get their hands on your old computers. […]

  • 7 Things Hackers Hope You Don’t Know

    One of the best ways to defend yourself against a Wi-Fi hacker is to learn to think like one. As a hacker, you could simply be on a quest to find something as innocent as free Internet access, or you could be a serious criminal, hired by a cybercrime syndicate to get inside a corporate […]

Top Cybersecurity Companies

Top 10 Cybersecurity Companies

See full list

Get the Free Newsletter!

Subscribe to Cybersecurity Insider for top news, trends & analysis