paykasa bozdurma
Home > Support > Blog
How to Use a Password Manager to Implement Good Password Practices

How to Use a Password Manager to Implement Good Password Practices

We’ve previously discussed what not to do when constructing passwords. I put a stake in the ground at 14 printable ASCII characters for offline systems and 20 for systems accessible over the internet. (Remember that those are minimum numbers. I tend to default to 32 characters whenever possible). Couple this with a “no repeat” recommendation and most people’s brains are about to explode! 

Monday, June 11, 2018/Author: David Wynne, Cybersecurity Engineer/Number of views (261)/Comments (0)/
Categories: Security Services
Tags:
The Most Valuable Alert: A Security Analyst’s Perspective

The Most Valuable Alert: A Security Analyst’s Perspective

When setting up monitoring, many people look at the IT assets inside the organization and set up alerts to identify attackers coming after those precious resources. It’s certainly important to be alerted when, say, an unknown user is being added to a Domain Administrator group. It’s a serious threat that’s easy to detect and address.

Tuesday, May 08, 2018/Author: David Wynne, Cybersecurity Engineer/Number of views (429)/Comments (0)/
Categories: Security Services
A Security Expert Explains the Top Password Pitfalls

A Security Expert Explains the Top Password Pitfalls

Typically, when I speak to someone about passwords and how to improve them, the follow-up question to the instructional “do this” is inevitably “why?” So we’re going to start with “why certain passwords are bad” and then follow up in a few weeks with “what should we do about that?” This post will attempt to show you the pitfalls many passwords fall into, broken down into four main categories.

Tuesday, April 24, 2018/Author: David Wynne, Cybersecurity Engineer/Number of views (500)/Comments (0)/
Categories: Security Services
Ransomware and the Vanishing Security of Anonymity

Ransomware and the Vanishing Security of Anonymity

There used to be a common belief, among cybersecurity professionals and business users alike, that you had to have something of value on your network for hackers to come after you. This is true to some extent, although many people think of value as money and only worry about financial data. Some also recognize the value of intellectual property, and there’s increasing awareness of the black-market value of personally identifiable information.

Thursday, November 09, 2017/Author: David Wynne, Cybersecurity Engineer/Number of views (516)/Comments (0)/
Categories: Security Services
RSS