This one is geared to all you IT professionals out there who
are looking to create a strong, effective, and simple to manage password
policy. We’ve talked
before about password
best practices, and what not to do.
If you want some more information on that particular subject, check out some
of the information provided by the security experts over at PortalGuard. Today, however, we’re going to look at the
password policy in some more detail to figure out what password management best
practices are the most effective in actual use.
Showing posts with label digital authentication and security solutions. Show all posts
Showing posts with label digital authentication and security solutions. Show all posts
Tuesday, September 22, 2015
Password Management Best Practices: Stemming the Tide
Friday, May 15, 2015
Importance of Password Expiration | Don’t have it – Why Not?
The importance of password expiration is an interesting
topic for me. It’s
all over the place online – and rightfully so. There are tons of questions floating around
out there: what is the best duration for a password, should be the same
expiration rate for each user, is password expiration beneficial. It can sometimes be a bit overwhelming to
look at. That being said: there are also
areas surrounding the importance of password expiration that are somewhat
debated (much like the last question above). In that regard, I would like to
take a look at an older article I found interesting and debate some of the
claims therein. Catch up after the jump!
Friday, May 1, 2015
Preventing Phishing Attacks | How to Protect Your Information Online
To this day, entering personal information
online makes many of us feel uneasy. In fact, I sometimes find
myself paying certain bills by submitting a hand-written check through the
mail. In a personal attempt to prevent phishing attacks, it makes sense. Now, some may call this old-fashioned method a waste of time. Maybe it's even being too paranoid
or merely an under-utilization of technology’s modern-day user experience. What can I say, old-fashioned ways tend to have a better ability to prevent phishing attacks!
Monday, April 20, 2015
War is Changing: Digital Authentication and Security Solutions
War is changing. We’ve talked about this before, but the state of war between nations is evolving every day. What once was a sequence of battles between armies, marching in line towards each other, has now become a digital minefield of secrecy, deception, and cyber attacks. It’s one of the age-old ideas for inventors and other entrepreneurs: give me something that will make life easier, and I’ll show you the next great weapon. Recently, the White House (you know, the place where all of the people that run things tend to go) was victim of a long-standing, brutal cyber attack. Sure, the various sources say that nothing ‘Top Secret’ was made available to the public or the attackers, but that doesn’t do much to make me feel better. I don’t know about you, but I’m left wondering: what did they get? I guess, in a way, the next leap my mind makes is towards digital authentication and security solutions.
Subscribe to:
Posts (Atom)