Posts Tagged: Passwords

Certificate Authentication is Vulnerable

When cracking passwords becomes as difficult as cracking keys, then passwords will be secure. When it comes to security implementations, there is a big difference between the theoretical and the practical. In the theoretical world all algorithms work flawlessly, there are no infrastructure vulnerabilities, and security protects against every attack. However, in the real worldRead… Read more »

The Similarity of Passwords to Symmetric Key

By Dovell Bonnett, Founder and CEO, Access Smart, LLC In a world of ever-increasing cyber-attacks, IT invests massive amounts of time, energy and money to secure corporate networks and data. Because there are no silver bullets, many different security technologies attempt to address each potential threat. With so many different vulnerability points, the first lineRead… Read more »

How to Protect Your Agency’s Social Media from Hackers

On January 12, a group claiming to be connected to ISIS hacked the Twitter and YouTube accounts of U.S. Central Command, also known as CENTCOM. If the military can be hacked, is your agency’s social media vulnerable to a hacker attack? How can your agency protect itself on social media? The hack of CENTCOM’s socialRead… Read more »

Celebrating National Cyber Security Awareness Month!

Cyber security is a hot topic among the private and public sector, especially as the consumerization of IT continues to grow as a trend and business tool. And although the Cybersecurity Act of 2012 failed to become a law, the need for strong cyber security measures, particularly within the federal government, has not diminished. IfRead… Read more »

How-To: Create Strong Passwords and Foil Hackers in 6 Easy Steps

Author’s note: this is a guide to help you better protect yourself and your privacy online. While no method is full-proof, these steps will point you in the right direction and I encourage everyone to work towards a safer, more secure New Year in 2010. Creating strong passwords is not enough when you consider justRead… Read more »