Crown Logo

Technology Support For San Diego Since 1996

Click here for 60 minute consultation858-483-8770
Reactive Network Defense with Honeypots

Reactive Network Defense with Honeypots

We’ve written on this blog about keeping your network safe by using strong authentication, advanced firewall technology, and modern antivirus software. Today, we’ll discuss another strategy for securing your networks: the honeypot. This technique allows...
Top 11 Wireless Home Network Security and Usability Tips

Top 11 Wireless Home Network Security and Usability Tips

Replace routers at least once every five years. This helps keep you secure by not falling behind on updates and patches, since new vulnerabilities are patched for newer devices, but older devices’ software may not keep being maintained. Adopt the latest wireless...
Patching Security Holes in Your Software

Patching Security Holes in Your Software

Hello, Crown Clients and Friends! In last week’s post, we briefly mentioned “zero day” vulnerabilities in software, and how our behavior as users doesn’t really affect our security with this type of attack. While this is mostly true, there is...
Employee Security Training is Essential to Your Security

Employee Security Training is Essential to Your Security

Hello, Crown Clients and Friends! Regular readers of this blog will know that just about every week, the word phishing makes an appearance. It’s just one of many types of attack that threatens the data security of your company, along with other attacks like brute...