perm_phone_msgHAVE AN EMERGENCY? Call: (40) 0765 279 019

Top Categories

Spotlight

todayApril 7, 2020

Cyber security + Whitepapers pMLrwRHGEC

WHY IS THE HEALTHCARE SYSTEM SO BAD AT CYBERSECURITY?

Imagine a doctor completely unaware of what they’re walking into triaging two patients: one in need of a hospital cardiac catheterization lab after an irregular electrocardiogram (EKG) reading, the other suffering from a stroke and needing a CT scan. All systems are down due to ransomware, so the physician working [...]


FEW CONSIDERATIONS OVER AN EFFICIENT PASSWORD POLICY

Uncategorized Gabriel Garban todayFebruary 11, 2020 87 1

Background
share close

In many cases, passwords are the primary line of defense protecting user accounts from being hijacked in an ATO attack. With the right policies and parameters in place to ensure strong, unique passwords, this defense can be quite effective.

According to a 2019 survey by Google, a staggering 65% of participants report using the same password across multiple accounts.

The following measures could be efficient:

● Monitor for Compromised Credentials – Dumps containing compromised passwords, usernames, and other credentials are easy pickings for threat actors.

● Use a Password Manager – It bears repeating: password managers are an easy, efficient way for users to maintain unique passwords for each account.

● Know When to Reset Passwords – Pros. are increasingly coming around to the realization that automatically forcing password resets at a specified time interval does not reduce the likelihood of accounts being compromised. Forcing users to frequently come up with new passwords can encourage them to reuse a password they’re already using for another account.

● Enforce Complexity and Uniqueness Standards.

Written by: Gabriel Garban

Tagged as: , , , .

Rate it

Post comments (1)

Leave a reply

Your email address will not be published. Required fields are marked *