How to Block Malware on Small Business Networks

Most of the small business clients I work with do not have a huge budget for a cybersecurity program, and something like a managed security service program (MSSP) is beyond their reach.  They have money for a firewall, and endpoint security, but that is about it.  Sound like your business?  Then read  on.

There are eight simple, free or low-cost things that small business IT professionals or IT support providers can do ...

Continue Reading →
0

Protect Yourself From Cyber Scams – Part 2

In our last post we looked at common web and phone based scams that I have seen personally, or have been targeted at a client.  Today we will examine other scams that are popular with cyber-criminals.

Some of these are targeted at specific industries or at people in positions of leadership or ownership of an organization or business.

  • Charity scams – ...
Continue Reading →
0

Using a Password Manager to Improve Password Security

Two weeks ago when we started this series on password security, we revealed some sad statistics.  60% of people use the same password on multiple accounts.  The average person has 26 password protected accounts, but only used 5 passwords across those accounts.  And 85% of people keep track of passwords through memorization.

People reuse passwords just because it is easier.  I get it, I have over 100 password protected accounts (not 26) and it is not possible for me to keep ...

Continue Reading →
0

Creating a Stronger Password

During the last week and a half we have been investigating the sorry state of password security.  Now for some more hopeful information.  In this post, we will look at the current recommended standards for creating a secure password, and policy recommendations from the National Institute of Standards and Technology (NIST).

Our recommendations for password strength is to use passwords with at least 12 or more characters.  The reason is that longer passwords are more secure in the face of automated ...

Continue Reading →
0

How I Got Your Password – Part 2

Did you know that the easiest way for me to get your password is just to ask for it? This is one way that cyber-criminals can get one of your passwords. In  our last post we focused on password cracking.  Today we will look at all the other ways that an clever attacker can compromise your password.

  • Social Engineering – Sometimes the easiest way to get password information is just to ask for it.  Social engineering is a type of con ...
Continue Reading →
0

How I Got Your Password – Part 1

In our last post we looked at the frighteningly short amount of time that it takes to crack a typical password.  Today we will look at all the different password cracking methods that a clever attacker can use to compromise your password, and how to defend against these attacks.

Password cracking

There are several types of automated password attacks that can be combined to make the process quicker, or to configure for a certain type of password attack.

  • Dictionary attack – This is ...
Continue Reading →
0

Most Passwords Can Be Easily Cracked

Did you know that the most popular passwords can be cracked in minutes?   And that passwords with 8 characters or fewer can be cracked in a few seconds?  This is why I say that passwords by themselves are no longer a useful form of security.  Today is the second of a five part series on password security, and focuses on the methodology used by password cracking software programs.

Cyber-criminal groups who specialize in password cracking generally harvest huge lists of user ...

Continue Reading →
0

Why Passwords Are A Soft Target

I have said it before, and I will repeat it now:  passwords by themselves are no longer a useful form of security.  The only option that makes passwords secure is two-factor authentication.  Today we embark on a two week investigation into passwords, why they are so easy to break, how your password might be compromised, and how to create a password system that is less vulnerable to exploitation.

Why are passwords so easy to crack?  Some of the answers we have ...

Continue Reading →
0
Page 3 of 44 12345...»