Transport Layer Security (TLS)

16th February 2020 | Cybrary Transport Layer Security (TLS)


Transport Layer Security (TLS) is a security protocol made for privacy and data security for communications over the Internet. A primary use case of TLS is encrypting the communication between web applications and servers, such as web browsers loading a website.  TLS can also be used to encrypt other communications such as email, messaging, and voice over IP (VOIP). If you are to look at the URLs of most websites, they feature the security protocol HTTPS, for example, https://cyberhoot.com/. Wherever there is HTTPS used, it is employing TLS encryption.

TLS v1.2 is Flawed, You should be Using TLS v1.3

In recent years, TLS 1.2 flaws have been identified which necessitated a migration to TLS version 1.3 which is more secure, efficient, and the gold standard for online encrypted communications.  If you’re not using TLS 1.3 yet, you should be. Watch the advanced video below to know why.

Source: CloudFlare

Related Terms: Encryption

What does this mean for an SMB?

Whenever your employees are on the Internet, they should always be aware of the URL and ensuring that HTTPS is employed for a secure connection.  

To learn more about Transport Layer Security, watch these short videos:

The Basics: TLS, SSL, and Handshakes

Advanced: How TLS 1.3 works better!

https://www.youtube.com/embed/AlE5X1NlHgg

Are you doing enough to protect your business?

Sign up with CyberHoot today and sleep better knowing your

employees are cyber trained and on guard!


Sign Up Today!

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

When One Password Ends It All

When One Password Ends It All

In June 2025, KNP Logistics Group, a transport company in the UK with 500 trucks and nearly two centuries of...

Read more
Automated Vulnerability Scanning and Penetration Testing Boost Cyber Resilience

Automated Vulnerability Scanning and Penetration Testing Boost Cyber Resilience

Vulnerability scanning and it's human led partner penetration testing (aka "pentesting") are excellent and...

Read more
Safe AI Adoption: Five Rules Every Business Must Follow

Safe AI Adoption: Five Rules Every Business Must Follow

Artificial Intelligence (AI) tools are entering our businesses like a new intern with great ideas but no...

Read more