Technology Advisor Blog



What is my Wireless Security Key?

Posted by Ann Westerheim on 1/2/13 10:27 AM

Did Santa bring you a new Kindle Fire, iPad Mini, or Microsoft Surface for Christmas?  If so, probably one of the first things you wanted to do was connect to your home wireless network.  To connect, you'll be asked for a "key", which is a code that lets you in (and keeps others out).  The common dilemma is that users have set up a wireless network a LONG time ago, recorded the key, and stored it in a "safe place", only to be stumped when you look for it again.  The problem is that after you program the key into your laptop or other portable devices, your system "remembers" it, so you end up forgetting. 

Read More

Tags: Security, Encryption, Wireless Network, Key





Stay Safe on a Public Wi-Fi Network

Posted by Ann Westerheim on 6/10/11 11:16 AM

Free public Wi-Fi networks are popping up everywhere - at the airport, Starbucks, your local music school...  These networks are a big convenience, but you should be aware of your security settings so you don't put your computer and data at risk.  When you connect to a network, there may be a firewall protecting you from the outside world and everyone else on the Internet, but when you connect to a local network, you're basically putting your trust in that network and everyone else on it - not a good idea in public!  In addition to file sharing, many of these wireless hot spots are unencrypted to make it easy for people to connect, but this could leave you vulnerable to malicious users in the coffee shop who could monitor your keystrokes!

Read More

Tags: Security, Encryption, Wi-Fi, Wireless





eMail Security - Sending Encrypted eMail

Posted by Ann Westerheim on 5/27/11 11:15 AM

Although email typically has a layer of security protection in the form of a password, users need to be aware that emails sent "in the clear" (not encrypted), CAN be intercepted and read by other parties using available tools.

Read More

Tags: email security, Encryption





Laptop Encryption - Part 2 - Know the Difference Between "Sleep" and "Hibernation"

Posted by Ann Westerheim on 1/11/11 9:28 AM

Good news, you've protected your laptop (and your business and your customers) by encrypting it.  Now, now an encryption key will be needed to access confidential or protected information.

Read More

Tags: laptop, Encryption





The Billion Dollar Lost-Laptop Study - Protect your Small Business!

Posted by Ann Westerheim on 1/11/11 9:27 AM

The "Billion Dollar Lost-Laptop Study" conducted by Intel and the Ponemon institute, reports that more than 300 businesses lost more than 86,000 businesses last year worth a staggering $2.1B.

Read More

Tags: computer security, Encryption, laptop loss





Subscribe by Email





    Most Popular Posts



    Browse by Tag

    See all tags...


    Connect With Us



    Older Blog Posts

    For older Ekaru blog posts, go to ekaru.blogspot.com.