Not Your Father’s Cybersecurity Tips: Think Outside the Box to Protect Your Identity During NCSAM

These five cybersecurity tips can help users review and update their online practices to protect their identities from advanced threats.

The post Not Your Father’s Cybersecurity Tips: Think Outside the Box to Protect Your Identity During NCSAM appeared first on Security Intelligence.

Continue reading Not Your Father’s Cybersecurity Tips: Think Outside the Box to Protect Your Identity During NCSAM

Login Lockdown: Six Account Protection Tips for National Cyber Security Awareness Month

Enterprises and individual users should follow these six account protection tips not just during National Cyber Security Anwareness Month, but year-round.

The post Login Lockdown: Six Account Protection Tips for National Cyber Security Awareness Month appeared first on Security Intelligence.

Continue reading Login Lockdown: Six Account Protection Tips for National Cyber Security Awareness Month

Login Lockdown: Six Account Protection Tips for National Cyber Security Awareness Month

Enterprises and individual users should follow these six account protection tips not just during National Cyber Security Anwareness Month, but year-round.

The post Login Lockdown: Six Account Protection Tips for National Cyber Security Awareness Month appeared first on Security Intelligence.

Continue reading Login Lockdown: Six Account Protection Tips for National Cyber Security Awareness Month

The ‘Cracken’: The Evolution of Password Cracking

IBM X-Force Red is leading the way in the field of password cracking with the Cracken, a tool designed to help companies improve password hygiene.

The post The ‘Cracken’: The Evolution of Password Cracking appeared first on Security Intelligence.

Continue reading The ‘Cracken’: The Evolution of Password Cracking

Have We Been Wrong All Along About Good Password Practices?

In its new guidelines on secure password practices, NIST recommended using long strings of random words instead of a combination of characters and symbols.

The post Have We Been Wrong All Along About Good Password Practices? appeared first on Security Intelligence.

Continue reading Have We Been Wrong All Along About Good Password Practices?

Security Specialists Discuss Identity and Access Management in the Age of Ransomware

Security teams should follow identity and access management (IAM) best practices to avoid widespread ransomware attacks such as WannaCry and NotPetya.

The post Security Specialists Discuss Identity and Access Management in the Age of Ransomware appeared first on Security Intelligence.

Continue reading Security Specialists Discuss Identity and Access Management in the Age of Ransomware

The Untapped Potential of Two-Factor Authentication

Two-factor authentication methods are more secure than passwords alone but require widespread adoption to be universally effective.

The post The Untapped Potential of Two-Factor Authentication appeared first on Security Intelligence.

Continue reading The Untapped Potential of Two-Factor Authentication

Administrator Credentials: A Security Breach Waiting to Happen

If access is not properly secured, cybercriminals can use weak administrator credentials to take control over corporate networks.

The post Administrator Credentials: A Security Breach Waiting to Happen appeared first on Security Intelligence.

Continue reading Administrator Credentials: A Security Breach Waiting to Happen

The New NIST Digital Identity Guidelines and What They Mean to You

With the most recent draft of its Digital Identity Guidelines, NIST revised many of its federal recommendations regarding passwords and access management.

The post The New NIST Digital Identity Guidelines and What They Mean to You appeared first on Security Intelligence.

Continue reading The New NIST Digital Identity Guidelines and What They Mean to You