Richard Rushing

Richard Rushing
computer connecting connects evil hot information instead internet send stronger twin via
Basically, an evil twin is someone who masquerades as a hot spot. They send out a stronger signal, so instead of connecting to the Internet via the hot spot, your computer connects to the evil twin. He can take all your information directly.
management product truly
It truly is a product lifecycle management problem.
hot laptop looking point preventing reach spot stuff touch touching
At any point in time, I can reach out and touch everyone's laptop at the hot spot, and there's usually not any way of preventing that -- from me touching and looking at other people's stuff at the hot spot itself.
across address associated bleed boundaries businesses decisions door growing hacking information internal leaving locations millions networks open physical protect provide render risks secrets seminar share smart spent vulnerable wide wired wireless
Most organizations have spent millions to protect their physical locations and wired networks, but if you're not securing the airwaves, you're leaving the back door wide open for hackers. Wireless networks bleed across physical boundaries and can render internal networks vulnerable to attack. In our seminar series, we will share the secrets of hacking and provide businesses with the information they need to make smart decisions about how their organization will address the growing risks associated with wireless networking.
great risk sit somewhere work
It's great to be able to sit somewhere and work without having any wires attached, no nothing attached, but you have that risk that it comes back to.
adds cycle decisions degree early fewer ground implement install middle people select solution start system trying worth
One of our decisions was to select a well-validated system and install it early in the process, when we could get by with fewer people to administrate it. You've got to start from the ground up. Trying to implement a PLM solution in the middle or the back end of a development cycle adds a degree of complication that may not be worth it.
either good organized requires software
To keep that all organized requires either headcount or a good software system.
information normally park sending shouting similar standing understand
Understand that the information you're sending is very similar to standing up here in the park and shouting out all the information -- would I normally do that?
cheaply intended large looking product
We are looking at a product intended to be manufactured in the millions. So where can you make things cheaply in large volumes? They aren't usually here.
airwaves amount challenge critical enabling flying georgia information secure state tremendous wireless
There is a tremendous amount of critical and confidential information flying through the airwaves in the Georgia State Capitol. Our challenge is to keep this information secure while enabling wireless access.