Cisco Blogs

Search Results

363 posts found

NCSAM Tip #21: Building Strong Security Policies

What good does a firewall, IPS sensor, encryption device, and your favorite security product and tool do if you do not have guidelines, policies, and best practices on how to effectively configure and use them? Building strong security policies is crucial for any organization. These policies should be strong, yet realistically flexible to accommodate ever-changing requirements. Policies communicate not only a standard but also an agreement on w…

Read More >>

Tags: , ,

NCSAM: Tip #20: The Importance of Your Online Reputation

Your reputation is one of the most important assets you have personally and professionally. Right or wrong, it defines how other people perceive you as a person. You can do positive things to improve or maintain a good reputation, such as demonstrating a high level of professionalism at work or loyalty to your family and friends. Likewise, you can easily damage a reputation through a seemingly innocent comment made to the wrong person. A damaged…

Read More >>

Tags: ,

5 Tips for Safeguarding Customer Data

…es are required by state and federal laws to provide certain privacy protections; and, if data is lost through a security breach, those companies face stiff penalties and hefty fines. Failing to protect customer information can devastate a small business. In honor of National Cyber Security Month, make sure you follow these five steps to help ensure safe data practices and happy customers. 1. Design a secure website. The first step is to build a…

Read More >>

Tags: , , , ,

NCSAM Tip #19: Secure Your Wireless Network!

Real World Consequences: Let me set the scene, your home with your family sitting on the couch watching TV. When all of the sudden a whole swarm of SWAT officers come busting through your front door on a no knock warrant. You and your family are separated, and you are forced to the ground at gunpoint with the officers screaming at you about your disgusting ways, shouting “We know WHAT YOU ARE, PEDOFILE!” But that will never happen to you right?…

Read More >>

Tags: , ,

NCSAM Tip #18: Password Strength

Using passwords longer than 14 characters resets the Windows LANMAN hash to an invalid value, preventing attacks against these weak hashes that can recover most passwords in less than half an hour. See also:…

Read More >>

Tags: ,