Remove 2004 Remove Antivirus Remove Cyber threats Remove Firewall
article thumbnail

How to Configure a Router to Use WPA2 in 7 Easy Steps

eSecurity Planet

Most of us connect our mobile devices to a Wi-Fi router for internet access, but this connection can leave our network and data vulnerable to cyber threats. To protect against those threats, a Wi-Fi Protected Access (WPA) encryption protocol is recommended.

article thumbnail

GUEST ESSAY: What everyone can — and should — do to mark Cybersecurity Awareness Month

The Last Watchdog

NCSAM launched in 2004, at a time where technology was nowhere near where it is today. Initial NCSAM efforts included urging people connected to the internet to update their antivirus software regularly. Pursue cyber hygiene. Firewalls act as a barrier to those trying to gain unauthorized access to networks and computer systems.