Bulletproof Office Helping You to Better Enable Your IT

By: Steve | August 15, 2014

Good Security Habits for Mobile Devices


The good news about our smart phone society is that those convenient little devices are just so very powerful! All those awesome games and apps! And the ease of communication and collaboration, whether it be by phone, text or video!  

By: Steve | June 12, 2014

Wireless Freedom
Wireless Freedom!

Increase Security Controls for Wireless Access

The beauty of Wi-Fi is the flexibility and convenience it provides. Unfortunately, because wireless access points are so easy to deploy and get running, sufficient care is often not taken regarding proper security safeguards.

Remember, cyber-criminals, whether they are professionals or high-school hackers, like all criminals, are opportunists. So, if you just do the following three things, you will disable most threats and encourage your attackers to look for other "low hanging fruit."

Wireless Access Points

  1. Use WPA2 encryption. WEP (Wired Equivalent Privacy) is an older method of security used to secure wireless networks. WPA/WPA2-Personal (PSK) stands for Wi-Fi Protected Access with a Pre-Shared Key, and was...