How can a small business password protect itself?

How can a small business password protect itself?

It should come as no surprise that businesses handling any amount of customer data are frequent targets of hack attempts. Hackers may be after credit cards, personal identities, or sensitive company data. The hackers after this information are not typically like you see in Hollywood movies either. They aren’t sitting in front of large Matrix-like terminal screens, watching ASCII characters scroll down the screen. The methods they use are relatively simple and easily obtainable, from brute-force dictionary attacks, to [...]

Webinar – Behavior Based Authentication to Protect IT Assets

Webinar – Behavior Based Authentication to Protect IT Assets

Securing IT infrastructure is a critical task that comes with multiple challenges. This task becomes even harder due to the ever-expanding landscape of threats. In our webinar, we highlighted these challenges and threats, and identified important problems with the status quo in IT Security. We then discussed how an Active Authentication approach can rise to the challenge and deliver an end-to-end solution that addresses these problems. Did you miss our Webinar? You can catch up everything in here. (more…)

Privilege Management for Healthcare Compliance and Security Teams

Enterprises, and small businesses work on trust. Trust between the business and the customer and trust internally inside the organization. In order to reinforce trust and make sure no violations occur, or at least we know when violations occur to take action – it is important for enterprises to manage the privileges that it affords to employees and contractors when handling customer data and business critical systems. An example of Privilege Management A typical example of Privilege Account Management (PAM) as [...]

2 Factor Authentication

2 Factor Authentication – A Primer

As people and companies become increasingly aware of the security risks involved in having many log-ins for many applications, methods of stronger security have been introduced over the years. Two-factor authentication isn’t necessarily new, but it has steadily improved and utilized new techniques that have made it a favorite security measure of many companies and end-users. What is 2 Factor Authentication? 2 Factor Authentication is a security method that utilizes two factor classes to make it exceedingly difficult for hackers to [...]

How do passwords work?

How Do Passwords Work?

If you've been using the internet for any length of time, you've probably accessed tens or even hundreds of websites that require a password. In most places online, a login and password is almost mandatory, regardless of whether you want to post in a forum or buy an item. Some sites even require you to create a username and password just to read their content. But what is going on when you create a password – and how does this [...]

Stop The Hack

Stop the Hack, Don’t Just Find out about it

Businesses that need to protect sensitive data may have methods for discovering hack attempts, but in many cases, they are frequently too late. Finding out about hack attempts isn’t good enough, especially if any of the hacks were successful. Relying on “intrusion detection” to prevent hack attempts means that you’re only detecting the hackers once they’ve actually gotten into your network system. The key is being able to stop hack attempts dead in their tracks, before they’ve gotten inside. Keep [...]

Is Your Organization at Risk from Insider Threats?

The stark reality of IT security today is that insider threats, from members of your organization, are just as potent a threat as those from outside. We don't like to consider the fact that our employees may be maliciously using business data for their own ends, but ignoring this fact leaves your business vulnerable. According to recent research[i], 62% of security professionals saw the amount of insider attacks they experience increase over the last year. The average frequency of these [...]

6 Tips for Securing Your WordPress Website Today

6 Tips for Securing Your WordPress Website Today

WordPress is a powerful, easy to use, content management system used by millions of business to create almost any website you can dream up. The developer-friendly nature of the system makes it ideal for a website for anything from a one-man start-up to a large multi-national, and the simple layout and menus in the CMS make it easy for non-technical staff to update and use. Unfortunately, the popularity and usability of the platform is also one of its biggest weaknesses. Hackers [...]

Pre Lit Christmas Trees and IT Security

Pre Lit Christmas Trees and IT Security

Yes, its 16 days to Christmas. Yes, the Santa hats and wreaths have already started adorning our streets, people, homes and cars. It is a time of the year to be grateful for what we have and to possibly reflect on what we do as part of our daily routine. I have often wondered “what is the true value proposition for pre-lit Christmas trees?” – the standard variety that you get from any Lowes, Costco and other store. I have asked [...]