Richard Rushing

Richard Rushing
across address associated bleed boundaries businesses decisions door growing hacking information internal leaving locations millions networks open physical protect provide render risks secrets seminar share smart spent vulnerable wide wired wireless
Most organizations have spent millions to protect their physical locations and wired networks, but if you're not securing the airwaves, you're leaving the back door wide open for hackers. Wireless networks bleed across physical boundaries and can render internal networks vulnerable to attack. In our seminar series, we will share the secrets of hacking and provide businesses with the information they need to make smart decisions about how their organization will address the growing risks associated with wireless networking.
computer connecting connects evil hot information instead internet send stronger twin via
Basically, an evil twin is someone who masquerades as a hot spot. They send out a stronger signal, so instead of connecting to the Internet via the hot spot, your computer connects to the evil twin. He can take all your information directly.
management product truly
It truly is a product lifecycle management problem.
hot laptop looking point preventing reach spot stuff touch touching
At any point in time, I can reach out and touch everyone's laptop at the hot spot, and there's usually not any way of preventing that -- from me touching and looking at other people's stuff at the hot spot itself.
cheaply intended large looking product
We are looking at a product intended to be manufactured in the millions. So where can you make things cheaply in large volumes? They aren't usually here.