Every day when I speak to various members of IT departments that are interested in the nFront Password Filter, there are a few common topics that we speak about during our conversations. First, he or she will mention that they…
Humans are very predictable and unless we see our company's name plastered across every news channel and online search engine due to a data breach, we will probably assume our company's network is safe, and we are doing a decent…

Running a password cracker is a standard part of any security audit procedure. Password crackers generally work in 4 ways – (1) a brute force crack (2) a dictionary crack (3) a hybrid dictionary crack and (4) rainbow tables. The…

Oftentimes, we are asked "What is the best password policy?"
There is no one size fits all policy that works for everyone. Your policy needs to be reasonable and not too overbearing. I have compiled some…

At nFront Security, we believe that providing tips and checklists are a great way for IT Administrators to know if they are forgetting about any important security measures that might have slipped their mind. There is a famous quote that…

October is National Cybersecurity Awareness Month, so below are some spooky tips to protect your company and be cyber smart!

When it comes to records, what are some of the most personal and sensitive records associated with your name that could be detrimental if they were exposed in a data breach? You may be thinking your IRS record, which includes…

We have all heard of drastic stories where large corporations and small businesses have been destroyed due to a data breach from a hacker. But, have you ever stopped to think the effects that the data breach has on the…
It seems like almost weekly we are seeing headline news stories of a new company falling victim to a data breach. There are many different reasons why a company is breached: Denial of Service Attacks, Malware Attacks, Password Attacks, and…
Changing your company's password policy can create a high level of apprehension for the IT department as well as management, especially when the password policy will become more restrictive for end-users. Your company's management team will have the primary concern…