MultiFactor Authentication

MultiFactor Authentication

Ask anyone worth their salt in security and they will tell you passwords are becoming a thing of the past, or rather already have. The number of data breaches grow each year, and yet weak passwords and password policies still remains an issue for security everywhere....
Cyber Security Professionals, Hardly the Final Frontier

Cyber Security Professionals, Hardly the Final Frontier

In the cybersecurity world, we all agree that there is a need for cybersecurity professionals with smarts, knowledge, know-how, as well as a willingness to learn. However, it seems the industry is having an increasingly difficult time finding people to fill their...
Security vs Compliance

Security vs Compliance

Your company has an upcoming compliance audit and your security staff is working overtime preparing; every control is put in place and each system is set to the exact specifications of the compliance audit. The day arrives and your company passes with flying colors,...
Distributed Denial of Service Attacks: What are They?

Distributed Denial of Service Attacks: What are They?

Distributed Denial of Service Attacks: What are They?Distributed Denial of Service (DDoS) attacks occur when multiple systems flood the bandwidth of a company, typically through a web server. These types of attacks are more often than not a result of multiple...