logo
 
  1. IT-Security >
  2. Cyber Security Nachrichten >
  3. Thoughts on whether or not password protect a guest network in a corporate environment


ArabicEnglishFrenchGermanGreekItalianJapaneseKoreanPersianPolishPortugueseRussianSpanishTurkishVietnamese

➤ Thoughts on whether or not password protect a guest network in a corporate environment

RSS Kategorie Pfeil IT Security Nachrichten vom | Quelle: reddit.com Direktlink öffnen Nachrichten Bewertung

Info sec team discussed today on whether or not we should password protect our network. Our guest network is segregated from our Corp network and is currently not secured with a pre-shared key at the moment (open to anyone). A disclaimer is prompted once connected to the guest network and the user must agree to terms and conditions to use the guest network. We previously had a pre-shared key that was recently removed and are now thinking of potentially going back to a pre-shared key. I’m curious as to what other info sec personnel’s thoughts were on this topic. Please let me know your thoughts!

submitted by /u/Brianda007
[link] [comments]...

➥ Externe Webseite mit kompletten Inhalt öffnen

➤ Ähnliche Beiträge

  • 1.

    TA18-106A: Russian State-Sponsored Cyber Actors Targeting Network Infrastructure Devices

    vom 281.48 Punkte ic_school_black_18dp
    Original release date: April 16, 2018Systems Affected Generic Routing Encapsulation (GRE) Enabled DevicesCisco Smart Install (SMI) Enabled DevicesSimple Network Management Protocol (SNMP) Enabled Network DevicesOverview This joint Technical Alert (TA) is the result of analy
  • 2.

    Malcolm - A Powerful, Easily Deployable Network Traffic Analysis Tool Suite For Full Packet Capture Artifacts (PCAP Files) And Zeek Logs

    vom 270.66 Punkte ic_school_black_18dp
    Malcolm is a powerful network traffic analysis tool suite designed with the following goals in mind: Easy to use – Malcolm accepts network traffic data in the form of full packet capture (PCAP) files and Zeek (formerly Bro) logs. These artifacts can be
  • 3.

    TA18-276B: Advanced Persistent Threat Activity Exploiting Managed Service Providers

    vom 206.64 Punkte ic_school_black_18dp
    Original release date: October 3, 2018Systems Affected Network Systems Overview The National Cybersecurity and Communications Integration Center (NCCIC) is aware of ongoing APT actor activity attempting to infiltrate the networks of global managed serv
  • 4.

    AA18-284A: Publicly Available Tools Seen in Cyber Incidents Worldwide

    vom 196.01 Punkte ic_school_black_18dp
    Original release date: October 11, 2018Summary This report is a collaborative research effort by the cyber security authorities of five nations: Australia, Canada, New Zealand, the United Kingdom, and the United States.[1][2][3][4][5] In it we highlight the use of five publicly
  • 5.

    USN-3125-1: QEMU vulnerabilities

    vom 182.01 Punkte ic_school_black_18dp
    Ubuntu Security Notice USN-3125-1 9th November, 2016 qemu, qemu-kvm vulnerabilities A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 16.10 Ubuntu 16.04 LTS Ubuntu 14.04 LTS Ubuntu 12.04 LTS Summary Several sec
  • 6.

    USN-3261-1: QEMU vulnerabilities

    vom 181.83 Punkte ic_school_black_18dp
    Ubuntu Security Notice USN-3261-1 20th April, 2017 qemu vulnerabilities A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 16.10 Ubuntu 16.04 LTS Ubuntu 14.04 LTS Summary Several security issues were fixed i
  • 7.

    TA18-074A: Russian Government Cyber Activity Targeting Energy and Other Critical Infrastructure Sectors

    vom 177.25 Punkte ic_school_black_18dp
    Original release date: March 15, 2018Systems Affected Domain ControllersFile ServersEmail ServersOverview This joint Technical Alert (TA) is the result of analytic efforts between the Department of Homeland Security (DHS) and the Federal Bu
  • 8.

    TA17-117A: Intrusions Affecting Multiple Victims Across Multiple Sectors

    vom 148.86 Punkte ic_school_black_18dp
    Original release date: April 27, 2017 | Last revised: May 14, 2017Systems Affected Networked Systems Overview The National Cybersecurity and Communications Integration Center (NCCIC) has become aware of an emerging sophisticated campaign, occurri
  • 9.

    DevAudit - Open-source, Cross-Platform, Multi-Purpose Security Auditing Tool

    vom 144.15 Punkte ic_school_black_18dp
    DevAudit is an open-source, cross-platform, multi-purpose security auditing tool targeted at developers and teams adopting DevOps and DevSecOps that detects security vulnerabilities at multiple levels of the solution stack. DevAudit provides a wide array
  • 10.

    How you can share passwords safely with friends and family

    vom 141.73 Punkte ic_school_black_18dp
    http://bit.ly/366dCkG How you can share passwords safely with friends and family we’ve all been informed infinite instances to by no means proportion your passwords. now not even together with your nearest and dearest. this is tremendous recommen
  • 11.

    Tango down report of OP China ELF DDoS'er

    vom 129.86 Punkte ic_school_black_18dp
    This report is credited to the team work between MMD, CERT and fellow researchers involved. Tango OP Announcement: We are releasing the take-down (Tango OP) project information of our current on-going operation against the ELF DDoS malware, the threat
  • 12.

    Enabling and securing ubiquitous compute from intelligent cloud to intelligent edge

    vom 128.56 Punkte ic_school_black_18dp
    Enterprises are embracing the cloud to run their mission-critical workloads. The number of connected devices on and off-premises, and the data they generate continue to increase requiring new enterprise network edge architectures. We call this the in

Kommentiere zu Thoughts on whether or not password protect a guest network in a corporate environment