Top Cybersecurity Blog Posts
THREATS + PREVENTION
Understanding the various cyber threats is the first step in protecting yourself from an attack.
- Types of Basic Wireless Attacks
- What Are The Different Types of Phishing and How Can I Protect Myself From an Attack?
- Dark Web Assessment to Prevent Cybersecurity Threats
- Cyber Risks for the Hospitality Industry
- Ransomware Beware
- Ransomware Beware Part 2: Principle of Least Privilege
- What is the Difference Between a Penetration Test and Vulnerability Assessment?
- What is Cyber Insurance? Is it Adequate Protection?
- Security in Seconds: Tracking Location Via Cellular Devices
PASSWORDS
Password security is the #1 area the average person (and even most organizations to a degree) can focus on to make themselves more secure.
- A Complete Guide to Password Management
- Common Password Management Mistakes
- Password Tips That Won’t Leave Your Head Spinning
SECURE YOURSELF
Cybersecurity is not only a hot topic of concern in the enterprise space but developing your own security infrastructure for your home workspace is critical as well.
- How to Secure Your Home Network from Intruders
- How to Secure Your Phone From Hackers
- Boosting Your Security Infrastructure At Home
- Boosting Your Cybersecurity Infrastructure at Home Part 2
- 8 Easy Ways to Instantly Improve Your Home Wi-Fi Network Security
WIRELESS SECURITY
For modern enterprises, core business operations and functions depend on the availability and security of wireless networks. Attacks targeting such networks can cause prolonged business interruptions leading to financial losses, diminished customer trust, dented reputation, non-compliance fines, and loss of sensitive information.
- How Does WiFi Work? WiFi Fundamentals
- Why Is Wireless Network Security So Important for All Businesses?
- Wireless Authentication Protocols
- Detecting Vulnerabilities on Your Wireless Access Points
- WiFi Hacking Devices
- What is WPS and Why Is It Dangerous?
- What is An Evil Twin and How Do You Spot One?
- What is WiGLE and Why Is It Important to Your Network Security?
- Published OUI Vendor List
- Hackers Targeting Preferred Network Lists (PNLs)
- What is Amazon Sidewalk and What Threat Does it Pose to Your Home Network?
- Security in Seconds: The Hidden Node Problem and How It Can Be Used to Circumvent Your Wireless Security
- Security in Seconds: Is Your Wireless Network Secure? Firmware Considerations
- Security in Seconds: Do You Know Who Is Connecting To Your Wireless Network?
- Security in Seconds: Detecting Common Open Networks
- Security in Seconds: Dangers of Connecting to a Common Open Network
- Security in Seconds: What is an SSID?
- Security in Seconds: How Does a Rogue Access Point Affect Network Security?
ABOUT US
Whether you are just building your security program, need to assess the performance of your current efforts, or want us to simulate a live attack, we are here to help at every step.

Jill Stagner
Jill is the Director of Marketing and Program Development. She manages the marketing, communication and company branding efforts for Pulsar. In addition, she helps with the public facing materials for all of Pulsar’s products and services.