NetAlly Network Testing Solutions
Close this search box.

Dr. Avril Salter

Wireless & Cyber Security Expert

Dr. Avril Salter is an author and acclaimed public speaker with over 20 years of in-depth technical and executive experience working in wireless and network security. She holds senior business and technical architect positions with a history of success in setting direction in major corporations and start-ups. She has an exceptional breadth of technical expertise in wireless standards and network security protocols and is a strategic thinker with a solid understanding of the IT and telecommunications industries.

More Articles by Dr. Avril Salter:

How to detect rogue devices: NetAlly explains

Detecting rogue devices on the network sounds straightforward, but it is a multifaceted problem that demands multiple layers of defense. This blog steps you through

Vulnerability Scanning vs. Penetration Testing

Vulnerability scanning and penetration testing are essential for strengthening an organization’s IT infrastructure against potential threats.   While both processes aim to improve security measures, the

Best Practices in Wireless Access Point Security

Wireless networks are vulnerable to several high-impact cyber-attacks, including eavesdropping on confidential data, unauthorized network access, and denial of service. Enforcing best practices for wireless

What wireless security types are there?

Why do we have multiple wireless security types? Today, WiFi networks are either open with no protection or protected with one of four security types:

Passive and Active vulnerability scanning

Passive and active vulnerability scanning are two approaches to finding weaknesses in an organization’s network. Weaknesses that cybercriminals could maliciously exploit. Every organization must run

What is WiFi security?

Wireless networks have two distinct security challenges in comparison with wired networks. Like wired networks, essential parts of protecting wireless networks are firewalls, intrusion protection