Symantec VIP Hardware Authenticator is a multi-functional security key which supports FIDO U2F (with Symantec VIP attestation certificate) and OATH HOTP (event-based). The HOTP function is to be used with Symantec VIP Access. The Symantec VIP authenticator (token) can bring an extra layer of security to your accounts and protect them from unauthorized access and phishing attacks.
The Nitrokey protect emails, files, hard drives, server certificates and online accounts using cryptography. Your private keys are always stored securely in the Nitrokey hardware and can’t be stolen. The Nirtokey is PIN-protected and is secured against brute force and hardware attacks. Backups protect against loss.
Brought to you by SANS Institute, this short video describes the steps that can be used at home to protect personal devices, Wi-Fi networks, and online accounts. It also covers the importance of information backups, such as Cloud services or external hard drives, in the event of an attack, theft, or loss of a device. Secure behaviors at work often start at home.
Fingbox provides security and control for your connected devices and home internet set-up. Automatically block intruders, hackers and unknown devices before they join your network. Get open port and network vulnerability alerts. Assign people to the devices on your network to know who’s home and who’s away with Fingbox Digital Presence. You can also see unknown devices near your home using Fingbox Digital Fence. Automate internet service provider (ISP) speed test reports and analyze bandwidth usage by device. Schedule and pause internet access, for specific devices, with parental control features.
Aegis Authenticator is a free, secure and open source app for Android to manage your 2-step verification tokens for your online services. Aegis is an alternative to proprietary two factor authentication apps like Google Authenticator and Authy. Its most important feature, is security.
All of your one-time passwords are stored in a vault. If you choose to set a password, which is highly recommended, the vault will be encrypted using AES-256. If someone with malicious intent gets a hold of the vault file, it’s impossible for them to retrieve the contents without knowing the password.
October is National Cybersecurity Awareness Month (NCSAM) and continues to raise awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have the resources they need to be safer and more secure online.
During National Cybersecurity Awareness Month (NCSAM), the following tip sheets and resources are invaluable tools for reducing cybersecurity risks and protecting yourself online. Use these resources in your communities and share them with your stakeholders throughout the year to encourage strong, nationwide cybersecurity. These materials are free and may be modified to meet your needs.
- Cybersecurity at Work
- Cybersecurity While Traveling
- Identity Theft and Internet Scams
- Internet of Things
- Multi-factor Authentication
- Online Privacy
- Protecting Your Digital Home
- Social Media Cybersecurity
Star Labs offers a range of laptops designed and built specifically for Linux. All Star Labs laptops come with a choice of Ubuntu, Linux Mint or Zorin OS pre-installed. They currently offer the Star Lite Mk II and the Star LabTop Mk III at extremely affordable prices.
The Star Lite Mk II delivers up to a 20% performance increase with an Intel® Pentium® N4200 quad-core processor and even faster SSD storage. The low power requirement of this processor and the Type II anodized aluminum chassis eliminate the need for a fan, meaning the Star Lite Mk II is virtually silent.
To the outside world, the Star LabTop Mk III is just an ordinary Linux laptop, but secretly, it is one of the fastest ultrabooks available. The new Star LabTop Mk III delivers up to a 20% performance increase with the new Intel® Core™ i7-8550u quad-core processor and even faster SSD storage. A 45.6-watt-hour battery is housed in the Type II anodized aluminum chassis allowing for a 40% increase in battery life.
Whether you’re storing critical business documents, games, or movies, the Portable SSD T7 Touch gives you speed and security in a palm-sized package.
Keep your private files secure without sacrificing convenience. The built-in security options on the T7 Touch utilize AES 256-bit encryption and give you the option of unlocking with a touch of your finger or with a password.
The T7 Touch SSD has no moving parts so it’s more resistant to shock. Plus, its solid aluminum unibody construction adds further protection, keeping your data safe from falls of up to 6 ft. Roughly the size of a credit card and only weighing 2 ounces, the T7 Touch fits comfortably in the palm of your hand and is light enough to take your files on the go.
KeyWallet Touch is a card type cold storage cryptocurrency hardware wallet which means you own your assets in secure hack-free device. It is impossible to hack assets in the cold wallet. KeyWallet Touch has the convenience of mobile wallet and the safety of cold wallet.
KeyWallet Touch is the best hybrid blockchain wallet. You can use mobile wallet and cold wallet simultaneously. KeyWallet Touch is available for Android, iOS and Windows. You can also use KeyWallet Touch on PC using a dedicated KeyWallet Reader.
Mudi works better than a typical travel router, as it secures your personal information in various ways. Including Mudi in your workflow will help secure your data from hackers, viruses and data leaks while using the public Internet.
Mudi uses Tor Anonymous Network Routing, Encrypted DNS, and is commercial VPN provider compatible. Mudi has a user-friendly web control panel interface. You can access it through any web browser on your mobile devices and computers; it is responsive and works flawlessly on different screens.
- 4G LTE Module
- Dual-band Wi-Fi
- 128GB Max.Micro SD
- OpenWrt Pre-installed
- USB-C port replicator
- DNS Encryption
- Built-in Battery