Search Results for: Secure authentication Blog Post Preventive Security Controls November 18, 2020 In IT security, there are certain controls that one has to implement to maintain a certain security level, react to... Blog Post Only 54% of Cybersecurity Pros Set Rules for Key Creation January 11, 2020 When you arrive at the office in the morning, you have to input your usernames and passwords in order to... Blog Post Top Techniques Used by Attackers to Bypass MFA August 25, 2021 Many consider MFA (multi-factor authentication) as one of the critical security defenses against malicious cyberattacks, and rightly so. Even a... Blog Post October is Cybersecurity Awareness Month October 18, 2021 October is Cybersecurity Awareness Month Cybersecurity Awareness Month was created as a collaborative effort between government and industry to ensure... Blog Post How to Secure Windows Remote Desktop Protocol (RDP) in 12 Steps June 10, 2021 As our working environments become increasingly orientated towards remote or hybrid paradigms, so does our reliance on remote technologies such... Blog Post How to Keep Attackers Out of Your VPN – According to the Feds October 29, 2021 In recent years, there has been an uptick in concern regarding cyberattacks by nation-state actors, particularly from countries like China,... Blog Post Web App Attacks Grew 251% In Two Years January 14, 2022 In general, online threats are increasing in frequency and severity. Businesses, organizations, governmental bodies, and other groups are finding themselves... Blog Post MFA Best Practices for People and Business to Interact Securely Online May 20, 2021 According to a Gartner report, end-user spending on public cloud services topped $257.5 billion in 2020. This figure is forecast... Blog Post Avoiding Multi-Factor Authentication – What Can You Do Against It? December 22, 2020 Multi-factor authentication refers to the practice of authenticating users using more than one identity verification methods. An email or username... Blog Post University Breach: Wi-Fi Networks Log-In Credentials, Thousands are Exposed October 28, 2021 Multiple certificate misconfiguration flaws in a free Wi-Fi network used by students and faculty from various universities can lead to... Blog Post Why is Password Reuse One of The Weakest Points in Cybersecurity? October 14, 2021 The use of weak and stolen passwords has consistently been highlighted as the most prevalent hacking technique cybercriminals use year... Blog Post WordPress Plugin Vulnerability Can Wipe Any Site Clean November 30, 2021 A new WordPress plugin vulnerability was identified in Hashthemes Demo Importer. Said plugin is a popular choice among web developers.... Blog Post Younger People Less Likely to Report, More Likely to Fall Victim to Cyber Crime December 24, 2021 A recent study by Atlas VPN reveals that younger individuals aged 18 to 40 are significantly less likely to report... Blog Post How to Protect Against Insider Risk? June 8, 2021 Cybercriminals and external threats pose plenty of challenges for organizations. Responding to the threats, nearly every organization puts in the... Blog Post Are open ports a security risk? October 14, 2020 Ports are numbers that are used in TCP and UDP protocols for identification of applications. While some applications use well-known...
Blog Post Preventive Security Controls November 18, 2020 In IT security, there are certain controls that one has to implement to maintain a certain security level, react to...
Blog Post Only 54% of Cybersecurity Pros Set Rules for Key Creation January 11, 2020 When you arrive at the office in the morning, you have to input your usernames and passwords in order to...
Blog Post Top Techniques Used by Attackers to Bypass MFA August 25, 2021 Many consider MFA (multi-factor authentication) as one of the critical security defenses against malicious cyberattacks, and rightly so. Even a...
Blog Post October is Cybersecurity Awareness Month October 18, 2021 October is Cybersecurity Awareness Month Cybersecurity Awareness Month was created as a collaborative effort between government and industry to ensure...
Blog Post How to Secure Windows Remote Desktop Protocol (RDP) in 12 Steps June 10, 2021 As our working environments become increasingly orientated towards remote or hybrid paradigms, so does our reliance on remote technologies such...
Blog Post How to Keep Attackers Out of Your VPN – According to the Feds October 29, 2021 In recent years, there has been an uptick in concern regarding cyberattacks by nation-state actors, particularly from countries like China,...
Blog Post Web App Attacks Grew 251% In Two Years January 14, 2022 In general, online threats are increasing in frequency and severity. Businesses, organizations, governmental bodies, and other groups are finding themselves...
Blog Post MFA Best Practices for People and Business to Interact Securely Online May 20, 2021 According to a Gartner report, end-user spending on public cloud services topped $257.5 billion in 2020. This figure is forecast...
Blog Post Avoiding Multi-Factor Authentication – What Can You Do Against It? December 22, 2020 Multi-factor authentication refers to the practice of authenticating users using more than one identity verification methods. An email or username...
Blog Post University Breach: Wi-Fi Networks Log-In Credentials, Thousands are Exposed October 28, 2021 Multiple certificate misconfiguration flaws in a free Wi-Fi network used by students and faculty from various universities can lead to...
Blog Post Why is Password Reuse One of The Weakest Points in Cybersecurity? October 14, 2021 The use of weak and stolen passwords has consistently been highlighted as the most prevalent hacking technique cybercriminals use year...
Blog Post WordPress Plugin Vulnerability Can Wipe Any Site Clean November 30, 2021 A new WordPress plugin vulnerability was identified in Hashthemes Demo Importer. Said plugin is a popular choice among web developers....
Blog Post Younger People Less Likely to Report, More Likely to Fall Victim to Cyber Crime December 24, 2021 A recent study by Atlas VPN reveals that younger individuals aged 18 to 40 are significantly less likely to report...
Blog Post How to Protect Against Insider Risk? June 8, 2021 Cybercriminals and external threats pose plenty of challenges for organizations. Responding to the threats, nearly every organization puts in the...
Blog Post Are open ports a security risk? October 14, 2020 Ports are numbers that are used in TCP and UDP protocols for identification of applications. While some applications use well-known...