484 KB | 3 files | PDF
Organizations of all sizes continue to rely on consumer networking equipment, despite the well-documented security and management risks such hardware poses. This guide will help you safely trim a few dollars from your networking budget by using "home" routers.
“Home” routers pop up everywhere, from the actual home to good-sized organizations and businesses that want to cut corners on wireless networking expenses. Amazingly, some best practices involved in configuring and securing these access points still are not practiced, despite more than a decade of warnings about what a bad idea it is to leave your SSID set to “default.”
This guide covers all the basics when it comes to securing home networking equipment. Among the pointers you’ll find: use a directional antenna to limit the range of your WLAN. If hackers can’t get a signal from the parking lot, you’ll be that much safer.
Included in this zip file are:
Chapter 1 delves into the first four stages of systematic strategic planning, including clarifying current conditions, identifying competitive advantages, defining opportunities and developing strategies. ... More >>
The excerpt from chapter 5 focuses on leveraging stakeholders to prepare your organization for change. This is an essential practice that ensures a successful product delivery. ... More >>
This document makes recommendations for how users and developers should select checklists from the NIST National Checklist Repository, evaluate and test checklists, and apply them to IT products. ... More >>