Have you ever wondered what the passwords are like for employees at an IT Security Company? Well, look no further! I am letting you know my password and how I created it. Of course, I did change it once I…
The NCSC (National Cyber Security Centre) provided guidance for Systems Administrators to simplify their approach to passwords. This guidance is not mandatory, but rather recommendations to eliminate the risk of breaches due to weak passwords on a company network. Furthermore,…
Carnegie Mellon University released a study in 2013 called "Measuring Password Guessability for an Entire University." CMU has over 25,000 faculty, staff, and students with a single-sign-on password. With this research study, CMU wanted to analyze how guessable the passwords…
The dsquery command is useful for obtaining information about objects located within an Active Directory environment. With the ability to implement a wide range of filters, this command is beneficial for obtaining specific information. One use case for this tool…
One of the best ways to protect yourself from having your information hijacked is to make sure that you are being smart about your password creation. While requirements like password length and special characters might be annoying, they are actually…
It is human nature to revert to patterns, commonalities, and habits. This is because we like COMFORT. Weak passwords may seem like the best option at the time, but how comforting is it to know that your company network could…
One would think that with data as sensitive as our personal finance, the banking industry would want to hold our log-in credentials to high standards. I would expect when I access my personal bank account, I would be required to…
One of the forms of multifactor authentication that can pose a threat to companies are USB drives. Using a USB drive as a password is very similar to the use of Smart Card Technology. When a user wants to access…
As Cybersecurity Awareness Month begins, nFront Security and Elroi have partnered this month to show the importance of protecting your sensitive data. Throughout the month, we will be sharing tips on how to #BeCyberSmart. Elroi specializes in helping enterprises understand…
Password hacking is a lot more prevalent than you think. Most IT Security admins think password hacking is a juvenile attack and thwarted by account lockout policies. However, like the rest of the technology world, hacking tools and techniques have…