Cisco Blogs

Cisco Blog > Security

Duct Tape and Chewing Gum Isn’t Enough: Cloud and Virtual Environments Require Specialized Security

By now, just about everybody who works in any area of IT knows that moving multiple workloads into one physical server optimizes server usage, minimizes procurement and operational costs, and increases overall efficiency of the network. As a result, virtualization technology remains one of the hottest topics in IT today, due to its overwhelming benefits to organizations of all sizes. Read More »

Tags: , , , , , ,

NCSAM Tip #18: Password Strength

Using passwords longer than 14 characters resets the Windows LANMAN hash to an invalid value, preventing attacks against these weak hashes that can recover most passwords in less than half an hour.

Read More »

Tags: ,

NCSAM Tip#17: Stay Safe Online — Security at Home

When we discuss security as an integral part of our cyber life, it is important that we take sufficient care that the home network and the devices that are used at home are secured. There are several areas at home in which we use Internet and IP-enabled devices. These include your home network (wired & wireless), personal computing devices, smart phones, official computing devices, network-enabled printers, and other smart appliances. While we look at security, all of these devices need to be reviewed for security best practices to ensure that the risk of an attacker penetrating or compromising these devices is reduced. This post concentrates on securing three main entities in a home network.

Read More »

Tags: ,

Securing the Mobile Experience Made Simpler

It is no longer a question of “if” your organization will face the new reality of mobile device proliferation, just an ever closer “how soon.” Users expect the network to enable trends like Bring Your Own Device (BYOD), and they aren’t just using smartphones and tablets to be more productive, they are falling in love with them. For businesses, simply allowing access isn’t the answer. It’s a question of relevant, secure access across the entire network, while protecting corporate assets and delivering an optimal user experience. Cisco focuses on exactly that – how to enable a simple and secure mobility experience, with a consistent end-to-end architecture across wired, wireless and VPN access.

As a cornerstone of this wired-wireless access architecture, the Cisco Identity Services Engine (ISE) has already been helping customers like Whittier Union High School, San Antonio Water System and BlueWater Communications Group apply consistent security across the entire network through a centralized, single policy source.

Whittier Union High School District, a California high school district serving more than 13,600 students, was facing the challenge of mobile devices. Both faculty and students were bringing their personal devices on campus, many for educational apps and tools.

“It’s becoming increasingly critical to provide employees, students, and visitors access to our network and extensive educational resources given the growing expectations of our tech-savvy population,” stated Karen Yeh, Director of Information Technology, Whittier Union High School District.

Whittier needed a way to apply differentiated policy across their student and staff populations, somehow managing access for both personal and corporate devices, all without increasing IT resources. Karen called Cisco, and two weeks later her team was deploying the Cisco ISE, implementing a single point of security policy for their networks across wired, wireless and VPN. Considering that Richard Nixon, the 37th president of the US went to Whittier High School, the flexible network access enabled by Cisco ISE may be empowering the next generation of leaders, scientist or artists. But, mobile devices aren’t confined to education. San Antonio Water System, a public utility owned by the city of San Antonio, is seeing surprisingly similar issues.

Read More »

Tags: , , , , , , , , , , , , , , , , ,

NCSAM Tip #16: Use Secure Password Management

Do you have a lot of passwords? Are they too hard to remember? Then use a secure password storage database. Password Safe, Password Gorilla, xPass, and several other tools are available. They all remember your user names, passwords, URLs, etc, and store them all in a strongly-encrypted database.

Read More »

Tags: ,