Protecting Your Systems Against Social Engineering

No matter how technically secure we set our devices, systems and accounts to be, there is always a human component to any cyber security protocol. Hackers and bad actors recognize this, and often times resort to manipulating users who have access to these systems to provide the information necessary to enter through the front door. … Continue reading Protecting Your Systems Against Social Engineering

Protecting Your Security on Social Media and Social Networks

One of the most vulnerable nodes in the average user's technological presence is on social media. With hundreds of millions of users on many different popular social media and networking platforms, these platforms prove fertile ground for spammers, scammers and cyber-criminals. Don't be a target, use these tips to protect yourself when interacting on social … Continue reading Protecting Your Security on Social Media and Social Networks

NIST and the New Standards of Password Security

When it comes to password policies, most organizations have similar rules about what qualifies as a good password. Normally, they require a minimum of 8 characters, including upper case, lower case, numeric and special characters, cannot be one of the five most recent passwords used, and have a maximum age ranging from 30-120 days depending … Continue reading NIST and the New Standards of Password Security