Last time, I
went over the three types of hackers out there.
To give you a stronger foundation from which to build your defense in
this digital world, I’ve broken down the category of hacker once more into the
various types underneath the hats. In
order to defend against impending subterfuge, it is important to know who may
be targeting you or your company.
Showing posts with label vulnerability. Show all posts
Showing posts with label vulnerability. Show all posts
Monday, October 5, 2015
Tuesday, September 22, 2015
Password Management Best Practices: Stemming the Tide
This one is geared to all you IT professionals out there who
are looking to create a strong, effective, and simple to manage password
policy. We’ve talked
before about password
best practices, and what not to do.
If you want some more information on that particular subject, check out some
of the information provided by the security experts over at PortalGuard. Today, however, we’re going to look at the
password policy in some more detail to figure out what password management best
practices are the most effective in actual use.
Wednesday, April 1, 2015
Phishing News: Windows Live Digital Certificate Risk
Looking to spend a little bit of that tax return on some sweet online deals? The latest news from Microsoft should make you do a double take before entering your credit card data. There is anew report of a windows live digital certificate risk making the rounds. They are reporting that an unauthorized SSL certificate was issued for “live.fi” that could have been used to leverage man-in-the-middle attacks or even spoof official Microsoft announcements.
Thursday, March 12, 2015
FREAK and Geeks: Attack and Defense
The Best Offense is a Good Defense
Glass houses are always the worst choice to live in; unless, of
course, you want to share your most private secrets with your neighbors. Most people prefer a house with stronger,
thicker, and less ‘see all’ walls where they can protect themselves and their
personal information. Neighbors can
throw stones all they want, but they’re not going to crack the walls of an
ancient, brick-mortar Victorian.
It’s an issue as old as time: people will always want to protect
their personal data from prying eyes.
Whether that means a thicker flap over the entrance to a straw hut, or a
high-end security system that monitors every entrance and exit to a mansion on
a hill. But as Hollywood has shown us time and again, where there is extra
security, there is usually somebody trying to take what’s hiding inside.
The digital age has only exacerbated this issue for most users and
companies around the world. The stronger
the information security in place, the more vigorous hackers attack in order to
find out what is hiding behind the high stone walls on the top of the
hill. Every so often, these hackers find
a spot where the mortar is weak, and they drill and drill, under cover of
night, until a hole is formed. Then, just out of sight, they sneak in and
quietly make away with everything you value most. So how do you stop somebody coming through
the walls around your data? Find the holes, and seal them back up.
Subscribe to:
Posts (Atom)