Tips for Isolating WIFI Clients

Wireless Client Isolation is a security feature that prevents wireless clients from communicating with one another. This feature is useful if you want to share WIFI with the public or you have a BYOD policy in your business, client isolation adds another level of security to limit attacks and threats between devices and gives you controls to preventing clients accessing your back-office servers, equipment and resources. This feature confines and restricts clients connected to the Wi-Fi network. They can’t interact [...]

Tips for Securing WIFI Networks

The good news is that it's not too difficult to lock-down your WIFI networks, which will both prevent others from stealing your internet and will also prevent hackers from taking control of your computers through your own wireless network. Here are a few simple steps to help secure your wireless network: Step 1. Open your router settings page First, you need to know how to access your wireless router’s settings. Usually, you can do this by typing its IP address into your [...]

Tips for Enabling WIFI Encryption

In order to prevent other computers in the area from accessing your WIFI network and data, you need to encrypt your WIFI signals. You might already have this in-place however it wouldn't hurt to double check your settings to ensure your protected. There are several encryption methods for wireless networks, including WEP, WPA (WPA-Personal), and WPA2 (Wi-Fi Protected Access version 2). WEP is basic encryption and therefore least secure and can be easily cracked easily and should NOT be used [...]

Major WIFI security upgrade, are you ready?

Let's take a moment and talk about some upcoming changes to the WiFi standards, these changes will bring massive security enhancements – However there’s a couple of things you need to be aware of. Over the years, we have seen WiFi overtake wired networks as the preferred and simplest way to connect devices: Enterprises are using WiFi to connect staff and devices to corporate networks. Retailers using it for POS and tracking of stock movements in warehouses. Public “Free WiFi” [...]

Tips for Implementing 4G for Internet Redundancy

In today’s business reliable access to the internet is your life blood, without internet you wont be able to send/receive emails and possibly be unable to process orders and run your normal operations, and if you running a phone system that’s using VoIP or SIP you will also be unable to take and receive calls which will not only annoy you and your staff, it will also prevent your customers from contacting you, which could possibly cause serious reputation [...]

Tips for Choosing Anti-virus and Internet Security

John McAfee turned some heads in the security community a few years ago when he declared that the virus protection software industry, which he is widely credited with creating 30 years ago, is dead. “In 1987, new applications for the Windows platform were being developed and released at a rate of about one new application per month,” he wrote. “Today, there are over 10 million malicious apps.” In short, conventional antivirus techniques simply can’t keep up. Many security experts don’t agree. [...]

Tips for Password Managers

A password manager is a software application that is used to store and manage the passwords that a user has for various online accounts and security features. Password managers store the passwords in an encrypted format and provide secure access to all the password information with the help of a master password. There are many types of password managers, differing in the way they encrypt the information, type of storage and the additional features provided. Password managers usually incorporate some [...]

Tips for Purchasing a UPS (battery backup)

Power outages, brown-outs, surges and electrical storms are all mortal enemies of computer equipment, the damaged they can cause may immediately fry equipment or sometimes causes minor damage that takes weeks before equipment fails or degrades. Power surge equipment should always be used on computer equipment however, that only protects your equipment from surges, a brown-out or power outage can also cause just as much damage to equipment and even permanent loss of data, for example a server uses Memory [...]

Tips for Proper Computer Equipment Ventilation

All computer equipment or electrical device used by your ICT needs to stay cool. Computers have fans and various heatsinks that draw out and dispel heat from components. Networking equipment like Routers, Modem, Switches, Hubs etc typically don't use fans to dispel heat, instead they use small vents in their case or sometimes their case is the heatsink, this is why its important you don't stack devices on top of each other, if equipment lives within a data cabinet [...]

Tips for Storing Data Offsite (Secondary location)

Throughout this portal we will refer to different Offsite Backup locations as "Primary" and "Secondary”, Primary backup and the Secondary backups live in different geographical locations (typically different States or Countries), both Primary and Secondary backup data is exactly the same, this method is used to protect against hackers, fires, floods, outages or other events that might impact both your main data source and the primary backup site. Let’s look at a couple of scenarios that utilize a Secondary backup [...]