Have you ever wondered what the passwords are like for employees at an IT Security Company? Well, look no further! I am letting you know my password and how I created it. Of course, I did change it once I…
At the beginning of each year, we're inundated on the internet with blog posts and articles relating to what will be the worst security threats for the coming year. These forecasters focus on what is yet to come and want…
Carnegie Mellon University released a study in 2013 called "Measuring Password Guessability for an Entire University." CMU has over 25,000 faculty, staff, and students with a single-sign-on password. With this research study, CMU wanted to analyze how guessable the passwords…
The word "manager" is derived from the Latin word manus, meaning "hand." That is essentially what a manager does, they lend a helping hand and guide you in the right direction. Let's face it, we have all experienced a time…
One of the best ways to protect yourself from having your information hijacked is to make sure that you are being smart about your password creation. While requirements like password length and special characters might be annoying, they are actually…
It is human nature to revert to patterns, commonalities, and habits. This is because we like COMFORT. Weak passwords may seem like the best option at the time, but how comforting is it to know that your company network could…
In light of recent news, your company has probably, hopefully, made securing your network a top priority. While the rest of your IT team is looking at how to protect your network from external threats- you can be one step…
Password hacking is a lot more prevalent than you think. Most IT Security admins think password hacking is a juvenile attack and thwarted by account lockout policies. However, like the rest of the technology world, hacking tools and techniques have…
In order to succeed today, organizations need to make data-driven decisions to boost performance and get ahead of the competition. However, with the sheer amount of information present, many businesses struggle to attain data-driven status. A report by M-Files reveals…
I’ve already harped on this a few times, but at nFront Security, we feel that this topic is often overlooked, and it can be a huge danger to some companies, especially after the Colonial Pipeline hack. People come and go…