Information Security
We will explain what AES and TKIP are and suggest which option you should choose for your WPA2-supported devices. Choosing the best encryption mode is important for both security and the speeds on your device.
By Penny Hoelscher in Information Security on August 24, 2023
National Cybersecurity Awareness Month falls in October each year but there's never a bad time to improve your cybersecurity. Here's how to boost yours.
By Aimee O'Driscoll in Information Security on May 14, 2021
WPA3 is the latest certification program released by the Wi-Fi Alliance. Find out why it became necessary and where you might expect to use it.
By Penny Hoelscher in Information Security on October 19, 2023
Working remotely? Stay secure online with these essential cybersecurity tips for remote work in today's digital landscape.
By Aimee O'Driscoll in Information Security on March 13, 2025
Receiving scam calls? Voice phishing, or vishing, is on the rise. In this post, we'll explain what a vishing scam is, how to recognize it, and what you can do to stay safe.
By Sam Cook in Information Security on November 24, 2021
Security experts cautioned the USB fans handed out to members of the press may be a ploy to infect d
The small packets of data that routinely travel across the internet can be intercepted and interrogated by all manner of ne'er-do-wells. We find out what makes packet sniffing dangerous and how best to protect your traffic.
By Jon Watson in Information Security on January 5, 2024
Phishing is a nasty business that runs 24/7/365. During tax season, a special type of phishing attac
By Dave Albaugh in Information Security on December 2, 2019
Malware is malicious software that acts counter to the interests of the computer that hosts it. Viru
By Stephen Cooper in Information Security on November 17, 2023
Page 42 of 51