BYOD_Policy_Compliance_Failing

Why Your BYOD Policy & Compliance Is Failing

Dror Liwer Blog

  In recent months, the debate over the future of BYOD has intensified. On the one hand, we really don’t need Gartner to tell us what we are already witnessing —  that more than half of all businesses will require employees to bring their own device by the end of 2017; while on the other hand a study by CompTIA …

Balance_Wireless_Network_Security

How to Balance Wireless Network Security With the Thirst for Increased Connectivity

Dror Liwer Blog

With workers relying more than ever on mobile devices to provide quick access to information, BYOD and BYON have become as ubiquitous and as necessary as office furniture. Yet, even though the “Bring Your Own” approach has revolutionized business, many companies still have a pre-revolutionary view to network cybersecurity. Companies still place great emphasis on protecting the network in the …

Rogue_Access_Points

How Good Wireless Visibility Can Beat the Rogue Access Points

Dror Liwer Blog

With wireless security, it’s all about visibility. Look around a coffee shop, airport, or even an office building and it’s impossible to miss all the smartphones, tablets and laptop computers. Just about everyone has a wireless device. But the downside to all these devices – and thus the downside to BYOD also – is a security threat that’s not clearly …

Thought you were safe with VPN? Think again!

Dror Liwer Blog

If you’ve been kicking back and basking in your wireless network security zone because you have the most robust VPN in place, this is your wakeup call. It has become increasingly clear that VPNs are not as safe or efficient as everyone thought they once were. It is easier than ever for hackers to hijack VPN ports and take advantage …

The Best of Coronet 2016

Dror Liwer Blog

We wrote them and you loved them. Here’s a recap of the posts you loved, shared, engaged, Tweeted, Liked, repurposed and gave us some feedback on the most in 2016.   1. Cybersecurity Worker Shortage & What We Should Be Doing About It Our most popular post tackled the much discussed issue of supply and demand in the niche of …

Confining the Enterprise Wi-Fi Cyber Mess

Dror Liwer Blog

When companies develop Wi-Fi policies, they factor from the outset that everyone from the top executives down to the newest intern will need internet access in all places and all times, even in-flight. Furthermore, if Wi-Fi is for some reason inaccessible, all smartphones have hotspot options, meaning that Wi-Fi surrounds us like the air we breathe. While this constant internet …

Why Not Even Google Pixel Can Offer Real Protection

Dror Liwer Blog

Pixel, the first smartphone made by Google (excluding HTC’s Nexus One) is creating quite a buzz in the marketplace.  Major questions, however, remain regarding the secure nature of the device.  While the waters have yet to be tested, Adrian Ludwig, Android’s director of security, has come out with an announcement declaring  the Pixel to be “as secure as the iPhone.” …

What’s behind the latest Coronet wireless management platform release?

Dror Liwer Blog

There is no doubt that companies are struggling to deal with BYOD policies. With the exponential growth of new wireless devices on the market, developing coherent and enforceable policies will soon be impossible. Companies understand that they cannot control the type of devices their employees use, nor gauge the risk levels around those devices. Furthermore, in the event of a …