{"id":18899,"date":"2015-11-26T06:45:00","date_gmt":"2015-11-26T06:45:00","guid":{"rendered":"http:\/\/cloudcomputing.sys-con.com\/node\/3567191"},"modified":"2015-11-26T06:45:00","modified_gmt":"2015-11-26T06:45:00","slug":"secure-authentication-for-public-wi-fi-cloudexpo-iot-bigdata","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/secure-authentication-for-public-wi-fi-cloudexpo-iot-bigdata\/","title":{"rendered":"Secure Authentication for Public Wi-Fi | @CloudExpo #IoT #BigData"},"content":{"rendered":"<p>Wi-Fi has become a necessity of the digital age, and like everything, everyone loves it even more when it is free. Whether it\u2019s used to access a presentation at a new client meeting, to host a video conference call, or edit and email important documents, public Wi-Fi means nearly anywhere can become an office. Couple this with the fact that there are as many mobile devices on the planet as there are people, and businesses now have the most flexible and tech-saturated workforce in history. However, public Wi-Fi networks, by their very nature, are a hotbed for silent cyber attacks, as a business\u2019s sophisticated security systems won\u2019t have any affect on them to protect users.<\/p>\n<p><a href=\"http:\/\/cloudcomputing.sys-con.com\/node\/3567191\" >read more<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Wi-Fi has become a necessity of the digital age, and like everything, everyone loves it even more when it is free. Whether it&rsquo;s used to access a presentation at a new client meeting, to host a video conference call, or edit and email important documents, public Wi-Fi means nearly anywhere can become an office. Couple this with the fact that there are as many mobile devices on the planet as there are people, and businesses now have the most flexible and tech-saturated workforce in history. However, public Wi-Fi networks, by their very nature, are a hotbed for silent cyber attacks, as a business&rsquo;s sophisticated security systems won&rsquo;t have any affect on them to protect users.<\/p>\n<p><a href=\"http:\/\/cloudcomputing.sys-con.com\/node\/3567191\" target=\"_blank\">read more<\/a><\/p>\n","protected":false},"author":143,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-18899","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/18899","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/143"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=18899"}],"version-history":[{"count":2,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/18899\/revisions"}],"predecessor-version":[{"id":19236,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/18899\/revisions\/19236"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=18899"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=18899"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=18899"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}