The NCSC (National Cyber Security Centre) provided guidance for Systems Administrators to simplify their approach to passwords. This guidance is not mandatory, but rather recommendations to eliminate the risk of breaches due to weak passwords on a company network. Furthermore,…
I’ve already harped on this a few times, but at nFront Security, we feel that this topic is often overlooked, and it can be a huge danger to some companies, especially after the Colonial Pipeline hack. People come and go…
If you watch the television series, Shark Week, that premieres for only one week per year, you might relate to the creepy, spine-chilling feeling when you watch people go underwater with lots of sharks. Some people have meat around their…
For the past few years, certain IT and security professionals have associated passwords as being negative due to recent data breaches. They recommend using biometrics, smart card readers, and other similar technology. The first password was used back in 1961 at…
The Cybersecurity Maturity Model Certification (CMMC) is a cybersecurity compliance requirement that allows businesses to work with the Department of Defense. It adds an extra layer of security to protect sensitive data. It consists of five levels, with some businesses…
It seems like almost weekly we are seeing headline news stories of a new company falling victim to a data breach. There are many different reasons why a company is breached: Denial of Service Attacks, Malware Attacks, Password Attacks, and…