The Best of Coronet 2016

Dror Liwer Blog

We wrote them and you loved them. Here’s a recap of the posts you loved, shared, engaged, Tweeted, Liked, repurposed and gave us some feedback on the most in 2016.   1. Cybersecurity Worker Shortage & What We Should Be Doing About It Our most popular post tackled the much discussed issue of supply and demand in the niche of …

Confining the Enterprise Wi-Fi Cyber Mess

Dror Liwer Blog

When companies develop Wi-Fi policies, they factor from the outset that everyone from the top executives down to the newest intern will need internet access in all places and all times, even in-flight. Furthermore, if Wi-Fi is for some reason inaccessible, all smartphones have hotspot options, meaning that Wi-Fi surrounds us like the air we breathe. While this constant internet …

Why Not Even Google Pixel Can Offer Real Protection

Dror Liwer Blog

Pixel, the first smartphone made by Google (excluding HTC’s Nexus One) is creating quite a buzz in the marketplace.  Major questions, however, remain regarding the secure nature of the device.  While the waters have yet to be tested, Adrian Ludwig, Android’s director of security, has come out with an announcement declaring  the Pixel to be “as secure as the iPhone.” …

What’s behind the latest Coronet wireless management platform release?

Dror Liwer Blog

There is no doubt that companies are struggling to deal with BYOD policies. With the exponential growth of new wireless devices on the market, developing coherent and enforceable policies will soon be impossible. Companies understand that they cannot control the type of devices their employees use, nor gauge the risk levels around those devices. Furthermore, in the event of a …

DDoS via Wi-Fi Phisher

Dror Liwer Blog

Reconnecting to your wireless router? Beware of Wi-Fi Phishing! Enterprise access points are often protected by the network security protocols and policies that cover the entire organization. The level of protection achieved is not similar in all businesses because lack of comprehensive knowledge is common and many businesses lack central control. In an era, in which we all work from …

Hackers Can Bypass HTTPS Protection on Windows, Linux, and Mac

Dror Liwer Blog

If you browse to a major website on the internet, chances are you’ll see something next to the URL—a tiny lock icon, next to the prefix “HTTPS.” This indicates that you’re currently using a secure version of the Hypertext Transfer Protocol. It means that the connection between your web browser and the application you are viewing is encrypted via TLS …

The Top 12 Influencers of Network Threats on Twitter

Dror Liwer Blog

We’ve compiled a top twelve list of the industry journalists you must follow if you’re concerned about network and mobile device threats.Why? Just because we love their work and have no doubt they will be useful to you too. Also, we’ve provided each of their Klout scores, otherwise known as a number (on a scale from 1 to 100) that shows …

The End for SMS-Based Two Factor Authentication

Dror Liwer Blog

For home users and enterprise professionals alike, SMS-based two-factor authentication (2FA) has become a relatively annoying fact of life. Type your password into your computer, wait while a text is sent to your phone, and then race to type in a second passcode before it expires. It’s a bit of a hassle, but for many it’s been the most important …

Why Medical Records Are Hotter Than Credit Card Thefts

Dror Liwer Blog

Last year, more than 113 million medical records were compromised. Government Health IT indicates that over a third (34%) of U.S. healthcare customer records have already been breached – the highest figure of any industry. Unfortunately, the fact is that hospitals and other healthcare institutions are struggling to adapt to the new threats they face. While health records are galloping …