Have you ever wondered what the passwords are like for employees at an IT Security Company? Well, look no further! I am letting you know my password and how I created it. Of course, I did change it once I…
The NCSC (National Cyber Security Centre) provided guidance for Systems Administrators to simplify their approach to passwords. This guidance is not mandatory, but rather recommendations to eliminate the risk of breaches due to weak passwords on a company network. Furthermore,…
The word "manager" is derived from the Latin word manus, meaning "hand." That is essentially what a manager does, they lend a helping hand and guide you in the right direction. Let's face it, we have all experienced a time…
The dsquery command is useful for obtaining information about objects located within an Active Directory environment. With the ability to implement a wide range of filters, this command is beneficial for obtaining specific information. One use case for this tool…
It is human nature to revert to patterns, commonalities, and habits. This is because we like COMFORT. Weak passwords may seem like the best option at the time, but how comforting is it to know that your company network could…
In order to succeed today, organizations need to make data-driven decisions to boost performance and get ahead of the competition. However, with the sheer amount of information present, many businesses struggle to attain data-driven status. A report by M-Files reveals…
Many people believe that hackers started at the dawn of computers and the internet being created. In fact, that is not true. Hackers evolved into hacking computers, smartphones, the internet, and so much more! One of the first known hacks…
If you watch the television series, Shark Week, that premieres for only one week per year, you might relate to the creepy, spine-chilling feeling when you watch people go underwater with lots of sharks. Some people have meat around their…
First and foremost, I would like point out that a password policy is only as good as the settings that you select. For example, you could pay a company millions of dollars for the most secure password policy in the…
We have noticed states facing an alarming amount of data breaches in the last few years, so they are adding stricter guidelines to help minimize more risks. Since states store vast amounts of data about citizens such as social security…