Protecting Your Employees’ Home IT From Cyberthreats

Helping employees protect their home IT reduces enterprise security risks and helps security leaders better safeguard corporate data.

The post Protecting Your Employees’ Home IT From Cyberthreats appeared first on Security Intelligence.

Continue reading Protecting Your Employees’ Home IT From Cyberthreats

Why You Should Drop Everything and Enable Two-Factor Authentication Immediately

Login credentials are a favorite target of today’s cybercriminals, and two-factor authentication is now crucial to meet bare-minimum security standards.

The post Why You Should Drop Everything and Enable Two-Factor Authentication Immediately appeared first on Security Intelligence.

Continue reading Why You Should Drop Everything and Enable Two-Factor Authentication Immediately

Young People May Shun Passwords, But That Doesn’t Mean They’re Less Identity-Conscious

IBM’s new “Future of Identity Study” revealed that while millennials are less likely to use complex passwords than their older counterparts, they embrace new technologies for identity protection.

The post Young People May Shun Passwords, But That Doesn’t Mean They’re Less Identity-Conscious appeared first on Security Intelligence.

Continue reading Young People May Shun Passwords, But That Doesn’t Mean They’re Less Identity-Conscious

In Case of Emergency, Break Glass: Protecting User Credentials in the Event of a Data Breach

Fraudsters are after more than just passwords, and protecting user credentials is more crucial than ever amid the increasingly advanced threat landscape.

The post In Case of Emergency, Break Glass: Protecting User Credentials in the Event of a Data Breach appeared first on Security Intelligence.

Continue reading In Case of Emergency, Break Glass: Protecting User Credentials in the Event of a Data Breach

Drowning in a Sea of Passwords? It’s Time to Adopt a Password Manager

A password manager enables users to access all their login credentials with a single master password, eliminating the need to juggle multiple credentials to access various accounts.

The post Drowning in a Sea of Passwords? It’s Time to Adopt a Password Manager appeared first on Security Intelligence.

Continue reading Drowning in a Sea of Passwords? It’s Time to Adopt a Password Manager

Drowning in a Sea of Passwords? It’s Time to Adopt a Password Manager

A password manager enables users to access all their login credentials with a single master password, eliminating the need to juggle multiple credentials to access various accounts.

The post Drowning in a Sea of Passwords? It’s Time to Adopt a Password Manager appeared first on Security Intelligence.

Continue reading Drowning in a Sea of Passwords? It’s Time to Adopt a Password Manager

The ‘Cracken’ in Action: A Password Cracking Adventure

To maximize the horsepower of its password cracking system, the IBM X-Force team built its own hardware to aid in penetration testing efforts.

The post The ‘Cracken’ in Action: A Password Cracking Adventure appeared first on Security Intelligence.

Continue reading The ‘Cracken’ in Action: A Password Cracking Adventure

Cybersecurity Tips to Help Retailers and Consumers Stay Secure During the Holiday Season

Consumers and retailers should implement these basic cybersecurity tips year-round to stay secure during the busy holiday shopping season.

The post Cybersecurity Tips to Help Retailers and Consumers Stay Secure During the Holiday Season appeared first on Security Intelligence.

Continue reading Cybersecurity Tips to Help Retailers and Consumers Stay Secure During the Holiday Season

How Not to Store Passwords: SHA-1 Fails Again

Symmetric key encryption, password hashing and SHA-1 are all ineffective ways to store passwords during the software development stage.

The post How Not to Store Passwords: SHA-1 Fails Again appeared first on Security Intelligence.

Continue reading How Not to Store Passwords: SHA-1 Fails Again

Addressing the Clear and Present Danger of an Electrical Power Grid Breach

Government agencies and companies in the energy and utilities sector must replace legacy equipment to avoid a potentially devastating power grid breach.

The post Addressing the Clear and Present Danger of an Electrical Power Grid Breach appeared first on Security Intelligence.

Continue reading Addressing the Clear and Present Danger of an Electrical Power Grid Breach