The SecurEdge Blog

Helping businesses provide secure WiFi by sharing insights into WiFi design, network security, installation, and troubleshooting. You've got questions, we have answers.

Topic: Wireless Security

5 Major Cybersecurity Trends You Should be Prepared for in 2016
Security

5 Major Cybersecurity Trends You Should be Prepared for in 2016

With every new year comes new technologies, but that new tech also means new security threats. How prepared is your business's network for new cybersecurity threats in 2016? In 2015, IBM and the Ponemon Institute determined the average cost of a data breach to be $3.79 million. We saw plenty of major companies find themselves vulnerable to hackers and data breaches throughout last year, and as data grows, so will the threats.

Read More
Is Your School Wi-Fi Network Ready for a Data Breach? 4 Tips to Prepare
Security

Is Your School Wi-Fi Network Ready for a Data Breach? 4 Tips to Prepare

As security is an ever-growing concern when it comes to using technology in the classroom today, it must evolve to keep up with threats, while remaining as user-friendly as possible. However, while wireless network security tools are increasing in effectiveness so too are the potential data risks. Threats to your school's network are becoming more complex, and more abundant thanks to the increasing amount of mobile devices and other connected gateways hackers look to exploit. 

Read More
4 Smart Ways To Secure Guest Wireless Access To Your Business Network
Security

4 Smart Ways To Secure Guest Wireless Access To Your Business Network

Many businesses today are scrambling to support the increasing demand for safer and faster guest wireless access to their networks. Wifi users today expect a certain level of access, you can't just throw up some access points anymore and call it a day, you need to deliver an experience to your users that enables mobility and security for both them and your organization.

Read More
8 Ways to Protect your Network with a Next Generation Firewall
Security

8 Ways to Protect your Network with a Next Generation Firewall

So, you are planning your next adventure to a far away land. You’re scanning through your tablet’s browser looking for cheap flights to your desired destination. While downloading the best mobile travel applications, you are also texting your travel companion with thumbs spinning so fast, you start kicking up more dust than the jeep you will be driving in on that safari.

Read More
BYOD and HealthCare.gov: 5 Tips for Secure Access
Security

BYOD and HealthCare.gov: 5 Tips for Secure Access

If you have read or seen the national news lately, you may have noticed the rollout of President Obama’s Affordable Health Care Act website to be a bit of a cluster. On Monday, President Obama addressed the negative feedback by saying, “The website is too slow and people are getting stuck. And I think it's fair to say, nobody is more frustrated about that than I am. Nobody's madder than me about the web site not working as it should, which means, it's going to get fixed.”

Read More
6 Helpful Hints On Securing Your Hospital Wireless Network
Security

6 Helpful Hints On Securing Your Hospital Wireless Network

Healthcare technology is changing rapidly with new laws being implemented regarding Electronic Medical Records (EMRs). Medical providers want a quick, efficient, accurate and secure method of keeping and exchanging records with wifi-enabled devices such as iPads or other brands of tablets. Maybe you have been a little too relaxed about securing your hospital wireless network?

Read More
Securing Mobile Devices on Hospital Wireless Networks
Security

Securing Mobile Devices on Hospital Wireless Networks

It seems that our beloved mobile devices like tablets and smartphones are ubiquitous in today’s age.  Students are using iPads in the classroom as learning tools.  Consumers are swiping their credit cards on iPhones to purchase goods. Even the healthcare world, though slowly, has gained traction in this new mobility craze. As with all wireless infrastructures, security is the number one concern. 

Read More
6 Security Features your Wireless Network Solution needs for BYOD
Security

6 Security Features your Wireless Network Solution needs for BYOD

Wireless networks are quickly becoming BYOD (bring your own device) networks. If you’re still on the fence on whether it’ll catch on, look at what devices you and your friends are carrying. I don’t know any of my friends or associates who don’t have a smart phone and/or tablet. But yes, we’re all gadget geeks. So let’s look what the industry experts are saying.

Read More
The Problem With Your campus Wi-Fi network Security
Mobility

The Problem With Your campus Wi-Fi network Security

In October of 2010, higher education saw some of its largest data security breaches ever, as the Social Security numbers, dates of birth, and other personal information for about 760,000 current and former Ohio State University students were accessed by unauthorized network users. There was also a breach of security at the University of Hawaii (UH) that accidently posted the private information of over 40,000 students online.

Read More
Easy BYOD Solutions for School Wireless Networks
Mobility

Easy BYOD Solutions for School Wireless Networks

Last year the iPad changed the rules for IT administrators.  The iPad, combined with many other new wi-fi enabled mobile devices put them in one of two positions: 1) Either they wanted to keep the devices off the internal network, or 2) they wanted them on the network in a secure way, without IT involvement.   SecurEdge Networks has been able to help customers on either side of the fence using the same solution. 

Read More
Role Based Network Security for School Wireless Networks
Security

Role Based Network Security for School Wireless Networks

Indoor and Outdoor wireless (wifi) access can be a very important asset for schools and college campuses. In today's mobile and wireless world, students are known to carry more than one wireless device. In fact, the typical student today carries at least three mobile devices: a smartphone, a laptop, and a mobile tablet such as a ipad or ipod.

Read More
The Problem with School Wireless Network Passcodes
Mobility

The Problem with School Wireless Network Passcodes

School Wireless Networks need to be controlled because there are way to many opportunities for improper use of the network from guests, staff or students. In this article, we explain the OLD WAY schools would use passcodes for accessing the school wireless network, how that system lacked and how we can help you gain back control of the users on your school wireless network.

Read More
How To Keep Your Employees Off Facebook with Next Generation Firewall
Security

How To Keep Your Employees Off Facebook with Next Generation Firewall

The use of Social Media during working or teaching hours have always been a concern to business owners, IT administrators, teachers or even the concerned parent. When asked if Social Media applications should be allowed at work or at school, there just isn't always a "yes" or a "no" answer. Allowing Social Media at work, school, or home just isn't that simple. Social Media, just like other things, needs to be controlled so time is not abused, but spent as efficiently as possible.

Read More
Concerned with Hospital Wireless Security? Start Here
Security

Concerned with Hospital Wireless Security? Start Here

In the past hospitals were afraid of wireless networking because of the obvious security issues surrounding a hospital wireless network. When you think about it, you’re basically broadcasting a network connection outside your walls so that now a hacker can take a shot at you without even setting foot inside a facility. This can be nerve racking for a CIO and network managers who carry the task of providing the infrastructure the hospital needs to support its many wireless applications (a list that grows everyday), but be able to provide it without allowing health records or other sensitive data to be compromised. There’s no way to dodge the requirement for wireless inside a medical facility today, so how do you provide the highest level of security?

Read More
1 2