paykasa bozdurma
Home > Support > Blog
A Security Expert Explains the Top Password Pitfalls

A Security Expert Explains the Top Password Pitfalls

Typically, when I speak to someone about passwords and how to improve them, the follow-up question to the instructional “do this” is inevitably “why?” So we’re going to start with “why certain passwords are bad” and then follow up in a few weeks with “what should we do about that?” This post will attempt to show you the pitfalls many passwords fall into, broken down into four main categories.

Tuesday, April 24, 2018/Author: David Wynne, Cybersecurity Engineer/Number of views (457)/Comments (0)/
Categories: Security Services
New Wi-Fi Standards Should Drive IoT Growth

New Wi-Fi Standards Should Drive IoT Growth

The Internet of Things (IoT) represents a convergence of several innovative technologies — all of which are entirely dependent on proper connectivity. Wi-Fi has emerged as the most popular form of IoT connectivity, but there are some limitations. IEEE standards are evolving to address those limitations.

Tuesday, April 17, 2018/Author: Bill Morris, GM Aware Software/Number of views (371)/Comments (0)/
The Value of Partnering with a Managed Network Service Provider for SD-WAN

The Value of Partnering with a Managed Network Service Provider for SD-WAN

Most people who work in the IT industry have heard the buzz about software-defined wide-area networking (SD-WAN). SD-WAN promises to reduce WAN costs, streamline management and simplify networking in branch locations. However, SD-WAN deployment comes with a new set of complexities that can create problems for your company. That’s why it makes sense to partner with a managed network service provider when transitioning to SD-WAN.

Tuesday, April 10, 2018/Author: Richard Faulkner, Solutions Architect/Number of views (504)/Comments (0)/
How to Break the Cyberattack Chain and Prevent a Security Breach

How to Break the Cyberattack Chain and Prevent a Security Breach

The SageNet Cybersecurity team has seen a recent trend in phishing attacks against organizations with Office 365. Using open source intelligence (OSINT) techniques, such as searching Google or LinkedIn, attackers are gathering email addresses of employees of the target organization and sending phishing emails from outside the organization. The goal of this campaign is to collect the Office 365 credentials of one or more employees.

Monday, April 02, 2018/Author: Neil Christie, CISSP, HCISPP, Director of Cybersecurity Operations/Number of views (367)/Comments (0)/
Categories: Security Services
How Digital Signage Can Enhance the Digital Customer Experience

How Digital Signage Can Enhance the Digital Customer Experience

The SageNet team will be at the Digital Signage Expo in Las Vegas from March 27-30. This is the biggest, longest-running conference focused exclusively on digital signage solutions and trends. We’re looking forward to an all-day forum dedicated to winning with the digital experience and meeting customer expectations. Industry leaders and innovators will discuss how to engage customers, design for the digital experience, integrate with existing systems and more, all of which create value and deliver the best possible business outcomes when planned and executed correctly.

Thursday, March 22, 2018/Author: IV DIckson, Director, Digital Signage /Number of views (483)/Comments (0)/
RSS
12345678910 Last