Privacy Policies of Wi-Fi Trackers

Wi-Fi trackers provide valuable information such as: people path, crowd size, visit duration, and frequency to retailers and businesses. However, Wi-Fi trackers are also a threat for citizen’s privacy. Periodically Wi-Fi enabled portable devices broadcast a unique identifier in the clear. By collecting this identifier, it is possible to detect a visitor, triangulate their position, … Continue reading Privacy Policies of Wi-Fi Trackers

45% of employees across organizations admit to engaging in unsafe behaviors throughout the workday.

According to the Dell End-User Security Survey 2017, forty-five percent of employees across organizations admit to engaging in unsafe behaviors throughout the workday. These behaviors include connecting to public Wi-Fi to access confidential information (46 percent), using personal email accounts for work (49 percent), or losing a company-issued device (17 percent). These scenarios represent a … Continue reading 45% of employees across organizations admit to engaging in unsafe behaviors throughout the workday.

WPA2-Enterprise 802.1X/EAP Authentication Process

WPA2-Enterprise 802.1X/EAP Authentication Process In WPA and WPA2 PSK all clients share a common security key. Potential security issues arise because all stations in the wireless network share the same security key. Although WPA and WPA2 PSK offer many advantages, it should not be used for an enterprise wireless network. The recommended solution for most … Continue reading WPA2-Enterprise 802.1X/EAP Authentication Process

Moving from just a Coverage Design to a more Capacity Design

Wireless Coverage: When designing a new wireless LAN, the variables to coverage are; the power settings (which are Country dependent), antenna gain, and the physical environment. The newer enterprise grade access points on the market will automatically adjust their settings for optimal coverage, but planning a wireless network has, unfortunately, never been as simple as … Continue reading Moving from just a Coverage Design to a more Capacity Design