‹ Back
Improving Technical Security 4 August 2014

MAAWG Best Practices to Address Online and Mobile Threats

Internet and mobile technology affects almost every facet of our day-to-day lives and is part of almost every business model. As technology has become integrated into our lives, our dependence on computers and mobile devices has grown. We use the devices to connect to family and friends, shop and bank online, engage with civic agencies and elected officials, interact with business colleagues and partners, streamline supply chains and deliver just-in-time products from manufacturing facilities to retails outlets. With a growing dependency and rapid migration of commercial transactions to online and mobile platforms come threats from cybercriminals.

‹ Back

Related articles

Building Trust 15 May 2019

Info Guide: 6 Ways “Lawful Access” Puts Everyone’s Security At Risk

What is encryption? Encryption is the process to scramble or hide information so it can only be read by...

Improving Technical Security 16 April 2019

Best Practices: Infrastructure Security

Optimize TLS implementation using information gleaned from public tools. This includes eliminating use of insecure ciphers and older, insecure...

Deploy360 1 March 2019

IPv6 Security for IPv4 Engineers

This document provides an overview of IPv6 security that is specifically aimed at IPv4 engineers and operators. Rather than...

Join the conversation with Internet Society members around the world