
Why a Simple Hack Can Destroy Customer Trust
In recent years, trust in general online security has taken a significant hit. Many high-visibility hacks and data leaks have led people (quite sensibly) to fear for the safety of their information. A...
In recent years, trust in general online security has taken a significant hit. Many high-visibility hacks and data leaks have led people (quite sensibly) to fear for the safety of their information. A...
In the offline world, we don’t let just anyone wander around our offices looking into files and opening drawers and cabinets. We have role-based security to keep things safe and secure. However, in th...
Introduction I recently came across the “SPHINX: A Password Store that Perfectly Hides from Itself” white paper that was released by IACR’s ePrint repository in July 2018. To be honest, I was not “tha...
Several years ago, to defend against hackers, it was fine for organizations to rely on anti-virus software, secure web gateways, firewalls, and other perimeter-based security tools. But these days, it...
Data breaches are happening all the time, in both big enterprises and even more so in SMBs – which experts view as “ground zero” for cyber crime. As a result, developing good password policies is esse...
Recently, I posted an article covering the 10 signs of a hack. It was designed for IT pros to share with end users, so they could be proactive vs. reactive. This new article is also for end users, and...
This should delight all of the wordsmiths and Jeopardy! fans out there: the word “hack” dates back to the 12th century, and derives from the Old English word “tohaccian”, which means “to hack to piece...
The recently reported hack of LabCorp – one of the largest blood testing labs in the U.S. – has raised some legitimate questions about the defense strategies of corporations in an era when cyber attac...
For all kinds of reasons, turnover is a fact of life. Even companies that routinely make “Best Employers” lists like Google and Costco need to be prepared for when — not if — an employee heads for the...
Adding a new team member is exciting — especially if they know how to play foosball! Of course, it’s always nice to say “welcome aboard” by having a team lunch, assigning a mentor, or viewing an orien...
Privileged Access Management (PAM) helps organizations achieve two key objectives: restricting access to privileged accounts and maintaining compliance. PAM is especially vital these days because, in ...
Don’t you hate it when your boss tells you thereasons cyber security is so importantand that the organization must adopt a stronger password policy? Seriously — who is your boss trying to impress? The...
We all know that data breaches are on the rise. Which means that most people are increasing their cyber security IQ, right? Unfortunately, that’s not the case! According to a survey by Pew Research Ce...
We all know that a strong password policy is the front line of defense to protect our financial transactions, personal communications and private information stored online. For end-users, using a stro...
We all know that protecting data at work is a critical priority, since a breach can lead to customer loss, reputation damage, investigation and remediation costs, and possibly even lawsuits, fines and...
We all know that today’s hackers are nothing like the “script kiddies” of years past. Back in the old days, hackers were usually interested in wreaking havoc, destroying machines, and getting on the n...
As you know, security is a top priority these days — especially as data breaches become more common, complex and costly. And if you’re a sysadmin or you work anywhere in or around SecOps or InfoSec, y...