Dangle Carrots in Front of Users to Correct Their Terrible Password Hygiene

Rewarding users for strong password selection can be a good way to eliminate terrible password hygiene throughout an organization.

The post Dangle Carrots in Front of Users to Correct Their Terrible Password Hygiene appeared first on Security Intelligence.

Continue reading Dangle Carrots in Front of Users to Correct Their Terrible Password Hygiene

Eliminate Weak Passwords With Regular Auditing

As countless security compromises have shown, weak passwords are a common root cause for the initial breach of a victim network.

The post Eliminate Weak Passwords With Regular Auditing appeared first on Security Intelligence.

Continue reading Eliminate Weak Passwords With Regular Auditing

Using Feedback Loops to Enhance End User Security

Security teams can use a feedback loop to measure end user security, educate users, illustrate consequences and measure end user behavior.

The post Using Feedback Loops to Enhance End User Security appeared first on Security Intelligence.

Continue reading Using Feedback Loops to Enhance End User Security

Ransomware: An Ounce of Prevention Is Worth a Pound of Cure

The “Ransomware Response Guide” can help your organization prepare for preventing this common threat or validate your existing security policies.

The post Ransomware: An Ounce of Prevention Is Worth a Pound of Cure appeared first on Security Intelligence.

Continue reading Ransomware: An Ounce of Prevention Is Worth a Pound of Cure

The Silver Lining of a Ransomware Infection

If you need a silver lining, think of a ransomware event as a low-cost security assessment pointing out weaknesses in your organization’s environment.

The post The Silver Lining of a Ransomware Infection appeared first on Security Intelligence.

Continue reading The Silver Lining of a Ransomware Infection