Building A Better Password

As a cybersecurity enthusiast for years, I am intrigued whenever there is a huge headline-making, media-frenzied security breach. Take, for instance, those two million passwords that were hacked earlier this month from social media sites, including Google, LinkedIn, Facebook, and even my venerable Twitter. At the same time, I am disappointed. The fight against cybercrime is never ending, but winning a battle or two would be nice.

Read more

Certified Ethical Hacker v8: Network Defense on the Offense

The majority of information security education emphasizes the definition and application of best practices. First, a network or system administrator needs to understand the proper application and configuration of network and security devices: routers, switches, firewalls, intrusion detection/prevention systems, and honeypots. A good start with strong IT policies facilitates the implementation.

Read more

What You Should Know About Cyber Heists

A cyber heist is a robbery that occurs in cyberspace or on the Internet. Hackers usually compromise business networks with e-mail scams and phishing attacks. They also steal usernames, passwords, logon credentials, and challenge questions, and they disable alerts before initiating the heists through the bank. Cyber heists have increased in intensity and sophistication over the past three years. What can you do, as a customer, or as a financial institution, do to protect yourself?

Read more