SearchSecurity.com

Worst practices: Encryption conniptions

Here at SearchSecurity.com, we writers spend a great deal of time and energy helping information security professionals explore new security technologies and understand industry best practices. But this month, in the spirit of April Fools' Day, I'd like to instead focus on some common enterprise habits that can really mess things up and cause security problems. After all, if we can't learn from our own mistakes, we're doomed to repeat them.

Here's a list of five worst practices that I'd like to share with you:

1. Using Wired Equivalent Privacy (WEP) encryption. Frequent readers of this site know that I beat the WEP drum often. In fact, the protocol's weaknesses were the subject of a best practices article that I wrote a few months ago:

    Requires Free Membership to View

All Rights Reserved, Copyright 2000 - 2013 , TechTarget | Read our Privacy Statement