SplashData published their annual list of the 25 Worst Passwords on the Internet. Here is the list that all IT directors should block as acceptable logon password to websites, networks, computers, etc. Not taking precautions could result in another sort of list such...
UCLA recently agreed to pay a penalty of $865,000 for a series of HIPPA violations and now they are forced to reveal that the theft of an external hard drive from a former employee’s home has created the fears of yet another security breach. Plus, UCLA is...
Criminal Hackers Using Social Media Profiles to Crack Passwords I recently read this article by Tom Godfrey in the Toronto Sun titled Linkedin to Identify Theft. The article talks about how social media sites are used by identity thieves. It also highlights how...
“The first layer of network security is to know ‘who is knocking on the door’.” – Dovell Bonnett All the recent cyber-attacks confirm the importance of strong identity verification. To satisfy Homeland Security Presidential...
Recently, at least 48 firms were successfully attacked when the “Poison Ivy” virus was planted on their Windows PCs. The attacks started probably in July and continued until mid-September of this year. The cause of the infection was by means of emails sent...
Great information but forgot a key security component. User Authentication. On Wed 26th of October I attended the Information Systems Security Association (ISSA) Security Symposium in Long Beach, California. Different security leaders discussed poignant topics like...