HOW TO STAY SAFE WHEN USING PUBLIC WI-FI

May 8, 2019

Most people tend to work from remote, public locations a few times a week. If you’re akin to hanging out at your local Starbucks and prepping your sermon, you could be risking a data breach without really knowing it. One of the most common ways that hackers can access your data is through a ‘man in the middle’ attack. The hacker finds a security flaw in the cafe or shopping center’s router, and exploits it to access the data that passes between you and the hub. To reduce the chances of getting ‘man-in-the-middled’, you need to check whether the public network you want to use is secured or unsecured before you join it. A quarter of all public Wi-Fi hotspots are entirely unencrypted. So, only use networks that require a log-in and password.

Spotlight

InGuardians, Inc.

InGuardians, Inc is a vendor-independent Information Security Consultancy based in Washington D.C. Our experts lead the industry in Red Teaming, Security Assessment, Penetration Testing, Forensics, Incident Response and Architecture Review. Our penetration testing runs the full gamut from network-level, to embedded device, to web applications.

Other Infographics
news image

CYBER SAFETY STARTS AT HOME

Infographic | January 28, 2020

With everyone in the family using the internet to engage in social media, adjust the home thermostat or shop for the latest connected toy, it is vital to make certain that the entire household — including children and older adults — learn to use the internet safely and responsibility.

Read More
news image

Cyber Security Awareness

Infographic | December 20, 2019

Cyber security awareness promotes foundational understandings on cyber threats and risk, cyber hygiene, and appropriate response options. It informs citizens on best practices and proactive measures when confronted with cyber risks.

Read More
news image

Cybersecurity Statistics for 2022

Infographic | June 10, 2022

If you work in the private sector (and provided you don’t live under a rock) you probably already know that cybercrime is a serious problem. A dastardly cybercriminal can expose finances, compromise customer information, and bring businesses to a halt. Skilled hackers are always finding creative ways to execute data breaches, setting a constant arms race into motion — cybersecurity professionals against cybercriminals.

Read More
news image

Cybersecurity for Small Businesses

Infographic | May 25, 2021

Small businesses often ignore security precautions. Sometimes it’s due to a lack of resources, other times it’s because they think hackers won’t care. On the contrary, 58% of all malware attacks are targeted at small businesses, because hackers know there is no proper security in place.

Read More
news image

Cyber Security What Makes a Strong Password

Infographic | December 1, 2019

The frustration of a forgotten password can be just too much to bear. Why not go with “Charles 15” or “my password”? because cybercrime is so prevalent. If you want your bank account to still have your money in the morning, you’d better strengthen your password.

Read More
news image

Privileged Access Management (PAM)

Infographic | April 4, 2022

Privileged access management (PAM) controls, monitors, secures and audits all human and non-human identities and activities across an enterprise IT environment.3% of organizations lack a mature approach to access management, resulting in two times more breaches.

Read More

Spotlight

InGuardians, Inc.

InGuardians, Inc is a vendor-independent Information Security Consultancy based in Washington D.C. Our experts lead the industry in Red Teaming, Security Assessment, Penetration Testing, Forensics, Incident Response and Architecture Review. Our penetration testing runs the full gamut from network-level, to embedded device, to web applications.

Events