password hack

Pride and Passwords: Top Hacking Methods & How to Prevent Them

Cybersecurity is becoming a pressing issue for IT professionals in all fields. There are headlines every week about data breaches of all sizes and the attacks themselves come from many angles. This article details the password attack methods hackers frequently used against enterprises and provides solutions as to how your business can prevent damage or breaches. 1. Dictionary Attacks A …

cybersecurity

Cybersecurity and What’s Not Working from Home

Though 2021 signals positivity, including vaccines for COVID-19, some changes in the workforce due to coronavirus are likely to stick around. Many things are possible from the relative comfort of our own homes, from university lectures to financial consultancy. In the next year, even as we return to some form of immunized normalcy, remote work will likely remain popular. However, …

benchmark

A Benchmark for Your Unsafe Passwords

News and warnings about data breaches and leaks abound at the moment, emphasizing the need for increased cybersecurity regardless of the industry. Microsoft’s Active Directory is often the perfect target for bad actors seeking to abuse compromised credentials. Despite the frequency of compromised credentials being the cause of data breaches, most organizations do not know whether their users’ passwords are safe. …

Biometrics Measure Up

How Biometrics Measure Up and Why They Aren’t the Cure-All for Cybersecurity

Each month there seems to be more news of data breaches, both large and small. As these events continue to increase in frequency, organizations are learning that they must engage, and rapidly, with new security measures. Companies are now turning their attention from password policies to biometric authentication solutions, without thinking every ramification through. The biometrics industry is expanding rapidly, …

health of security

The Health of Security

After experiencing a massive ransomware attack that caused the near-shutdown of 400 sites, the Universal Health Services (UHS) has become the most recent example to highlight the issue of cybersecurity in health care organizations. In a recent statement, UHS revealed that the attack affected acute care facilities and behavioral health hospitals, as well as corporate level systems, and caused UHS …

Password Blacklist

Password Blacklists: Applying the Goldilocks Principle

One of the most effective ways to increase the strength of your network’s security is to screen users’ passwords against a list of dictionary passwords and known compromised passwords. Password vulnerabilities remain a major entry point for hackers. Over the last few years, password policy has evolved in significant ways. NIST password guidelines now indicate that using a password blacklist …