Let's Talk
Welcome to the Cygilant Blog

Password Pain, and Three Solutions to Fix the Problem

Posted by John Linkous on May 12, 2017

Recently, social media giant Facebook announced that they are providing, free of charge, code to allow app developers to implement delegated account recovery.  This is effectively a more elegant replacement for the traditional “security questions” approach to resetting a password, which historically has required the user to setup a series of questions that (ostensibly) only they know the answer to.  However, a Microsoft survey from several years ago already identified that over 10% of those supposedly “secret” questions could be answered within five guesses by nearly anyone, and that participants forgot 20% of their security question responses within six months.

Is Changing Your Password Actually Making You Less Secure?

Posted by Trevan Marden on Aug 9, 2016

We’ve recently written a number of posts about the role that passwords and strong authentication methods play in security. Locking down logins and implementing access controls has long been a cornerstone of information security. Most information security professional understand the factors that make passwords strong. For a quick refresher, check out our recent post on the subject. In short, a strong password is typically very long; includes numbers, mixed case, and special characters; includes no words or discernible patterns and is definitely not your pet’s name. You should also never reuse the password or use the same password across multiple systems.

Strong Password Management is Critical to Network Security

Posted by Security Steve on Aug 3, 2016

 

Passwords may be one of the most misunderstood elements of network security. The critical importance of the role passwords play in thwarting cybersecurity breaches cannot be downplayed or understated. Weak passwords undermine a company’s network. One of the key points of security tools, such as network security monitoring, is to flag unusual (and therefore suspicious) activity on an organization's computer systems. If passwords are so simplistic that hackers can guess them correctly in a normal number of attempts, then cybersecurity software is much less likely to notice and flag these cybercriminals' efforts.

Even Mark Zuckerberg Gets Hacked: It’s Time to Change Your Password

Posted by Shawn O'Brien on Jun 23, 2016

 

Cybersecurity failures are so frequent that they even happen to individuals we'd expect to have taken better precautions. That's certainly the case with Facebook founder Mark Zuckerberg, whose social media accounts were hacked due to a poor password. The breach illustrates two common mistakes that many users make when creating account passwords, and why passwords are a crucial part of endpoint security.

6 Videos Every Cybersecurity Professional Needs to Watch

Posted by Security Steve on Jun 2, 2016

 

In an industry that's constantly evolving, it can be a challenge to stay on top of recent trends. Following cybersecurity news sites and blogs can help educate you about current happenings, but what about the bigger picture? We've rounded up six online videos that cybersecurity professionals should watch in order to become better informed about today's most pressing cybersecurity issues.

Is Your Password Putting Your Company's Security at Risk?

Posted by Vijay Basani on Apr 14, 2016

 

Passwords are a crucial element in network security, but their importance is often misunderstood. One of the key points of security tools such as network security monitoring is to flag unusual (and therefore suspicious) activity on an organization's computer systems. If passwords are so easy for hackers to guess that they can obtain them in a normal number of attempts, then cybersecurity software is less likely to notice criminals' efforts. But even businesses that do not rely on advanced security tools can still benefit from strengthening their password practices. The following is some basic advice on passwords. But first, a look at the problems.

 

The 3 Most Common Cybersecurity Mistakes Made by Employees

Posted by Security Steve on Feb 1, 2016

 

Employees are the lifeblood of an organization, and if they neglect good cybersecurity practices, the company's overall cyber defenses are weakened. Here are three common cybersecurity mistakes employees make—and the best ways to address them.

1. Falling for Phishing

Phishing may be a common scam, but employees are still falling for it. Between late 2013 and August 2015, the FBI found that more than 7,000 U.S. companies were victimized by business email scams—with total losses exceeding $740 million. A single well-written phishing email can confuse employees into clicking a fraudulent link that installs malware on company machines, or can trick accountants into wiring money into false banks accounts purportedly owned by company executives traveling overseas.

7 Things to Do Immediately After a Security Breach

Posted by Kevin Landt on Sep 8, 2015

Dealing with a security breach is like a police officer drawing his or her gun: in all likelihood, you’ll go your whole career without having to do it. But regardless of the unlikelihood, you need to be prepared.

 

We have come up with seven steps you should take if ever you discover you have been hacked and your company’s data has been compromised.

How to Protect Your Customers’ Personal Data from a Security Breach

Posted by Vijay Basani on Jul 23, 2015

In the last several years, companies large and small have lost their customers’ personal data to hacks at a huge cost, not just in dollars and cents but in the more central currency of trust and reputation. It is integral to your company’s future to demonstrate to your customers that if their info is going to be stolen it sure isn’t going to be through your company’s lackadaisical security measures.

LastPass Breach: Is ‘One Ring to Rule Them All’ Good Security?

Posted by Trevan Marden on Jun 23, 2015

 

Subscribe to Email Updates

How Much Could You Save?

Find out now with our
60-second ROI calculator!

Calculate!

Posts by Topic

See All