Posts Tagged: Passwords

NIST Password Guidelines and Microsoft got Password Security Wrong (Part 1)

Security or convenience is no longer an acceptable trade-off when it comes to cybersecurity. They must be mutually inclusive, otherwise employees will circumvent security for their own personal convenience. NIST and Microsoft understands this to a degree, but in the latest NIST Password Guidelines SP 800-63-3 the recommendations favors password convenience over password security.

Making Passwords Secure: Missing the Weakest Link in Cybersecurity

Yes, Passwords are Secure! They are not going away; they can’t. The attacks we see daily is not a password authentication problem, but rather a password management nightmare. Has your organization put their employees into the role of Network Security Administrator? If you allow them to generate, remember, type, manage and know their logon passwords… Read more »

Is Your Website Security at Risk?

OmniStudio is often asked if WordPress sites are more vulnerable to security breaches than other content management platforms. With all websites, even those run by Fortune 500 companies, the threat of hacking is ever present, regardless of the platform it’s built within. Professional website design and development firms who use open source platforms, like WordPress or… Read more »

Certificate Authentication is Vulnerable

When cracking passwords becomes as difficult as cracking keys, then passwords will be secure. When it comes to security implementations, there is a big difference between the theoretical and the practical. In the theoretical world all algorithms work flawlessly, there are no infrastructure vulnerabilities, and security protects against every attack. However, in the real world… Read more »

The Similarity of Passwords to Symmetric Key

By Dovell Bonnett, Founder and CEO, Access Smart, LLC In a world of ever-increasing cyber-attacks, IT invests massive amounts of time, energy and money to secure corporate networks and data. Because there are no silver bullets, many different security technologies attempt to address each potential threat. With so many different vulnerability points, the first line… Read more »

How to Protect Your Agency’s Social Media from Hackers

On January 12, a group claiming to be connected to ISIS hacked the Twitter and YouTube accounts of U.S. Central Command, also known as CENTCOM. If the military can be hacked, is your agency’s social media vulnerable to a hacker attack? How can your agency protect itself on social media? The hack of CENTCOM’s social… Read more »