Why You Don’t Need A Password Manager

OneLogin announced on May 31, 2017, that their company was hacked between the hours of 2:00 am to 9:00 am PST. No big deal, right? Wrong. OneLogin is an online service that lets users manage their multiple different logins and passwords with a single sign-on (SSO). Essentially, OneLogin is a password manager that entices customers […]

Read more

Say Goodbye To Windows Hello

What is Windows Hello? Windows Hello, according to Microsoft, is a more personal way to authenticate your computer using either your face, fingerprint, or iris. The technology is equipped with the Surface Book, Surface Pro 4, and some PCs. For example, you will hold your head still in front of your computer’s camera and it […]

Read more

We Support Carnegie Mellon University’s Password Research

Carnegie Mellon University released a study in 2013 called “Measuring Password Guessability for an Entire University.” CMU has over 25,000 faculty, staff, and students with a single-sign-on password. With this research study, CMU wanted to analyze how guessable the passwords would be in a password attack by standard password cracking tools and algorithms. A standard […]

Read more

Making An Informed Decision To Protect Your Network

Humans are very predictable and unless we see our company’s name plastered across every news channel and online search engine due to a data breach, we will probably assume our company’s network is safe and we are doing a decent job protecting it. Companies may slide by for years and not be on a hacker’s […]

Read more

Hard Facts: Data Breaches

Joseph Demarest Jr., Assistant Director of FBI’s Cyber Division states: “You’re going to be hacked.” Do you have a plan for when this happens? Furthermore, are you enforcing the necessary precautions to ensure that your end-users are not making poor password choices? Password1 and Welcome1 are the top 2 business passwords and are both accepted […]

Read more

Put Password Rules In The Hands Of The User

This topic might seem to alarm you since the fate of your company will be placed in the hands of your employees. When I talk to many prospective customers of nFront Security, I hear the common problem of end-users selecting the company name, seasons (Summer, Winter, Fall, and/or Spring), months (January, February, March, etc.), or […]

Read more

Hacker and Cyber Insurance 101

Let’s talk about insurance and what it’s actually intended to do. According to Google’s dictionary, insurance has two meanings: 1. A practice or arrangement by which a company or government agency provides a guarantee of compensation for specified loss, damage, illness, or death in return for payment of a premium. 2. A thing providing protection […]

Read more

Common Mistakes of IT Administrators

At nFront Security, we believe that providing tips and checklists are a great way for IT Administrators to know if they are forgetting about any important security measures that might have slipped their mind. There is a famous quote that reads: “Rename your ‘To-Do’ list to your ‘Opportunities’ list.” – Steve Maraboli Here are a […]

Read more

How to Prepare for your Annual IT Audit

An IT audit is the review and evaluation of your company’s IT infrastructure, policies, management, and any related processes. Sometimes IT audits coincide with the annual financial audit. IT audits are very important because it will let you know if your company is being adequately protected by your systems in place. It can also help […]

Read more

How To Create A Hack-Proof Password Dictionary

Password blacklisting, also known as dictionary checking, is a very important security measure to have in place for passwords. Dictionary checking prevents the use of common passwords like Password, Welcome, and Baseball. We all know these passwords and insecure and ineffective to secure a computer. Therefore, why are we allowing these passwords on our network? […]

Read more