Cisco Blogs


Cisco Blog > Small Business

Mythbusters: All Data Encryption is the Same, Right?

Many small businesses opt for wireless networks; they provide the connection you need and are easier and less expensive to set up than a wired network. But that convenience can cost your company in compromised security and lost data if the network isn’t appropriately encrypted.small_business, wireless, wireless network, WLAN, security

Although most wireless LAN (WLAN) equipment comes with many settings preconfigured, encryption isn’t one of them. In this latest installment of Mythbusters, we explain why the encryption protocol you choose—Wired Equivalent Privacy (WEP) or Wi-Fi Protected Access (WPA)—makes a difference.

Read More »

Tags: , , , ,

Keep passwords safe and secure with password management

A password manager can encourage users to adopt unbreakable passwords

As users, we know that we should use complex, secure passwords that aren’t easily guessed words from the dictionary like ”admin” or personal dates to protect our systems. Nonsensical words and phrases that substitute digits and symbols for letters, such as ”45Monk3y t1m3 fun!,” are the most secure. But we also know how difficult it can be to create several unique, strong passwords—and even harder to remember them all.

To encourage employees to create passwords that are hard to crack but easily remembered and used, you can provide them with a password management system. Password management is both a standard company-wide policy for developing passwords, and, for many companies, a password manager application you add to your security arsenal as part of your small business security policy.

Read More »

Tags: , , ,

Correlating NetFlow Data for Proactive Security: Network Notoriety

Prelude

In this short article the reader will first learn what NetFlow is and how it works. Next the reader will understand how it can be as an important security tool. Finally, a technique for correlating NetFlow results with public sources of Internet reputation, along with the tool “Netoriety,” which implements the technique, will be introduced and explained.
Read More »

Tags: , ,

Cisco IPS Sensor Default Signature Configuration Modifications

The threat landscape is an ever evolving environment that must be addressed with constant iteration. Since the Cisco Intrusion Prevention System signature configuration has grown over the past few years, the Cisco Security Research and Operations IPS Signature Development Team performed an exhaustive review of the default IPS signature settings currently shipping. As a result of that analysis, the team will be releasing changes to the default signature set via signature updates in a two-phase process over the course of several months.

Read More »

Tags: , ,

New User Interfaces in Cars – flashy but are they safe?

Up until recently I was an owner of a hybrid car from one of the leading car manufacturers. The mechanical side of the car was good but I always had some serious doubts about the car’s cockpit. In particular, the touch screen mounted squarely in the middle of the dashboard, presumably to be equally accessible to the driver and the front passenger.

Read More »

Tags: , ,