Pride and Passwords: Top Hacking Methods & How to Prevent Them

Cybersecurity is becoming a pressing issue for IT professionals in all fields. There are headlines every week about data breaches of all sizes and the attacks themselves come from many angles. This article details the password attack methods hackers fr… Continue reading Pride and Passwords: Top Hacking Methods & How to Prevent Them

Password Blacklists: Applying the Goldilocks Principle

One of the most effective ways to increase the strength of your network’s security is to screen users’ passwords against a list of dictionary passwords and known compromised passwords. Password vulnerabilities remain a major entry point for hackers. Ov… Continue reading Password Blacklists: Applying the Goldilocks Principle

Seven Active Directory Security Tips from The Experts

Microsoft Active Directory (AD) allows IT administrators to manage users, data, and applications within their organization’s network. Due to its popularity and importance within companies, AD is a perfect target for ‘bad actors.’ We’ve most likely all … Continue reading Seven Active Directory Security Tips from The Experts

A Tale of Two Password Protection Approaches

Static Vs. Dynamic Hardly a day goes by without news of passwords being exposed in a third-party data breach. Once leaked, these credentials are easily available to other hackers via the Dark Web and, thanks to the rampant problem of password reuse, th… Continue reading A Tale of Two Password Protection Approaches

Good, Better, Best: Using Multi-factor Authentication Effectively

Multi-factor authentication (MFA) is useful, but not a failsafe strategy for user authentication. The purpose of identity and access management technology is, generally speaking, to prevent unauthorized users from viewing, stealing, or manipulating dat… Continue reading Good, Better, Best: Using Multi-factor Authentication Effectively

Trusting Passwords: Best Practices for Threat-Proofing Credentials

“Open, Sesame!”Upon reflection it’s easy to see that passwords have an incredibly long history: from shibboleths to military codes, they’ve been used in many situations to preserve privacy and identity. With the creation of comp… Continue reading Trusting Passwords: Best Practices for Threat-Proofing Credentials