Wireless network components
Understand key parts of a business WLAN, including access points, network interface cards and range extenders, and how to set them up.
76 - 100 of 294
Understand key parts of a business WLAN, including access points, network interface cards and range extenders, and how to set them up.
How to respond to a cyber attack and develop an effective cyber incident response plan for your business.
How to know if your business is under a cyber attack, and what to do to contain or control a cyber breach.
Assess and manage cyber risks, create security policies and practices, and consider cyber insurance for your business.
Understand the impact of cyber attacks on your business and your finances, reputation and consumer confidence.
Find out why cyber criminals target businesses and what assets (financial or otherwise) may be at risk from attacks.
Understand the common ways cyber criminals may target your business, how attacks work and their effects on you.
Introduction to small business cyber security, covering common risks and practical ways to manage them.
Steps to select the right wireless network for your business and roll it out successfully.
How to assess your requirements for wireless networking, and choose the right wireless network for your business.
How to protect your wireless network and devices from unauthorised access and cyber attacks.
What are short-range wireless networks, also known as personal area networks or PANs, and how do they benefit businesses.
What are cellular networks, and how they support data and voice communications in your business.
Understand how wireless local area networks (LANs) work, and what they can do for your business.
Key business advantages and potential disadvantages of Wi-Fi or wireless networks.
Overview of wireless networking for businesses, including advantages, disadvantages and setup options.
Follow these ten practical steps to secure your business WLAN against hackers, eavesdroppers and network abuse.
How to use virtual private networks (or VPNs) and firewalls to improve the security of your business' devices and wireless network.
An overview of the WPA, WPA2 and WPA3 - the key wireless security protocols commonly used in modern wireless network products.
Overview of common WLAN threats like eavesdropping, spoofing and denial-of-service attacks, and basic steps to reduce risks.
Different types of WLAN standards, and their benefits for speed, range and security in business networks.
Best practices to secure your business wireless network against common threats like hacking, eavesdropping and denial-of-service attacks.
Check mobile contracts before your staff travel to EU and EEA countries, to prevent unforeseen roaming charges.
Overview of the data protection code of practice for online services likely to be accessed by children.
Essential cyber security measures for small businesses to prevent, detect and respond to cyber attacks.