Transport Layer Security (TLS)

16th February 2020 | Cybrary Transport Layer Security (TLS)


Transport Layer Security (TLS) is a security protocol made for privacy and data security for communications over the Internet. A primary use case of TLS is encrypting the communication between web applications and servers, such as web browsers loading a website.  TLS can also be used to encrypt other communications such as email, messaging, and voice over IP (VOIP). If you are to look at the URLs of most websites, they feature the security protocol HTTPS, for example, https://cyberhoot.com/. Wherever there is HTTPS used, it is employing TLS encryption.

TLS v1.2 is Flawed, You should be Using TLS v1.3

In recent years, TLS 1.2 flaws have been identified which necessitated a migration to TLS version 1.3 which is more secure, efficient, and the gold standard for online encrypted communications.  If you’re not using TLS 1.3 yet, you should be. Watch the advanced video below to know why.

Source: CloudFlare

Related Terms: Encryption

What does this mean for an SMB?

Whenever your employees are on the Internet, they should always be aware of the URL and ensuring that HTTPS is employed for a secure connection.  

To learn more about Transport Layer Security, watch these short videos:

The Basics: TLS, SSL, and Handshakes

Advanced: How TLS 1.3 works better!

https://www.youtube.com/embed/AlE5X1NlHgg

Are you doing enough to protect your business?

Sign up with CyberHoot today and sleep better knowing your

employees are cyber trained and on guard!


Sign Up Today!

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Microsoft Integrates Passkeys into Windows: is this the start of a Passwordless Future?

Microsoft Integrates Passkeys into Windows: is this the start of a Passwordless Future?

Let’s be honest, who hasn’t reset a password at least once this month? For decades, passwords have been our...

Read more
When You Become the Hacker: How Modern Attacks Trick You Into Hacking Yourself

When You Become the Hacker: How Modern Attacks Trick You Into Hacking Yourself

In a shift away from the usual “hack-meets-victim” narrative, a new kind of cyber-assault is emerging. One...

Read more
Domain Takedowns: How to Remove Fraudulent and Typo-squatted Domains and Websites

Domain Takedowns: How to Remove Fraudulent and Typo-squatted Domains and Websites

In cybersecurity, not all attacks happen through fancy malware or zero-day exploits. Some of the most effective...

Read more