Your Wi-Fi Can Be Heard a Long Way Away

Many people are frustrated by their Wi-Fi networks. Among other things, there is interference, reflections, attenuation (signal loss) because of walls, long distances or whatever, and the hassle of managing all that. We have to remember one critical thing about Wi-Fi: it’s radio so it is heavily regulated. The power the devices and access points […]
Read More ›

Eavesdropping On Computers From Afar

When I teach Learning Tree’s Cyber Security introduction, participants are often amazed at the ways bad actors can eavesdrop on computers. Most of them are aware of software that can be planted by bad actors that can capture keystrokes, for instance, but few are aware that noises from keystrokes, the vibration of a notebook, and […]
Read More ›

Microsoft SATVs Updates — What’s Changing and What You Need to Know

Microsoft is now updating Software Assurance benefits, which includes the retirement of Software Assurance Training Vouchers, or SATVs. Here’s what you need to know. What are SATVs?
Read More ›

Social Engineering Basics – Is Your Business At Risk?

What is Social Engineering? A hacker who uses social engineering effectively  preys on people, not technology. A few common practices include: Researching targets on social media to get personal data such as birthdays, addresses,  and historical information that may be used to  answer security questions. Calling customer service representatives for service providers an individual works […]
Read More ›

Data Doomsday: The Ransomware Call

It’s a Tuesday afternoon, the office is bustling, your servers are down and your tech team is stumped. The phone rings – the call you’ve been dreading. Your data and critical servers have been compromised. The attackers are demanding a hefty fee to undo the damage. It’s a scenario that has played out thousands of […]
Read More ›

Type to search blog.learningtree.com

Do you mean "" ?

Sorry, no results were found for your query.

Please check your spelling and try your search again.