<img height="1" width="1" src="https://www.facebook.com/tr?id=3323484487762706&amp;ev=PageView&amp;noscript=1">
TOPIC

Sonar

Blog Post Sonar

What Is WPS and Why Is It Dangerous?

Wi-Fi Protected Setup (WPS) is a functionality built into many wireless routers to make it easier ...
Corey Belanger
Blog Post Sonar

Why Is Wireless Network Security So Important for All Businesses?

Only one thing comes to mind when companies hear the terms wireless networks or Wi-Fi – ...
Duane Laflotte
Blog Post Sonar

How to Secure Your Home Network From Intruders

With the current digital transformation, today’s households feature a wide range of ...
Tim Connell - Head of Enterprise Products
Blog Post Sonar

How to Secure Your Phone From Hackers

Mobile phones have gained mainstream popularity since hitting the market in the 90's. The mobile ...
Tim Connell - Head of Enterprise Products
Blog Post Sonar

Types of Basic Wireless Attacks

When it comes to information security, it feels like there's a million and one things to learn. The ...
Steve Steinberg
Blog Post Sonar

What Is An Evil Twin and How Do You Spot One?

Wi-Fi has been around for many years, yet little has been done to improve protection from wireless ...
Corey Belanger