Making An Informed Decision To Protect Your Network

Humans are very predictable and unless we see our company’s name plastered across every news channel and online search engine due to a data breach, we will probably assume our company’s network is safe and we are doing a decent job protecting it. Companies may slide by for years and not be on a hacker’s […]

Read more

Hard Facts: Data Breaches

Joseph Demarest Jr., Assistant Director of FBI’s Cyber Division states: “You’re going to be hacked.” Do you have a plan for when this happens? Furthermore, are you enforcing the necessary precautions to ensure that your end-users are not making poor password choices? Password1 and Welcome1 are the top 2 business passwords and are both accepted […]

Read more

Put Password Rules In The Hands Of The User

This topic might seem to alarm you since the fate of your company will be placed in the hands of your employees. When I talk to many prospective customers of nFront Security, I hear the common problem of end-users selecting the company name, seasons (Summer, Winter, Fall, and/or Spring), months (January, February, March, etc.), or […]

Read more

Hacker and Cyber Insurance 101

Let’s talk about insurance and what it’s actually intended to do. According to Google’s dictionary, insurance has two meanings: 1. A practice or arrangement by which a company or government agency provides a guarantee of compensation for specified loss, damage, illness, or death in return for payment of a premium. 2. A thing providing protection […]

Read more

Common Mistakes of IT Administrators

At nFront Security, we believe that providing tips and checklists are a great way for IT Administrators to know if they are forgetting about any important security measures that might have slipped their mind. There is a famous quote that reads: “Rename your ‘To-Do’ list to your ‘Opportunities’ list.” – Steve Maraboli Here are a […]

Read more

How to Prepare for your Annual IT Audit

An IT audit is the review and evaluation of your company’s IT infrastructure, policies, management, and any related processes. Sometimes IT audits coincide with the annual financial audit. IT audits are very important because it will let you know if your company is being adequately protected by your systems in place. It can also help […]

Read more

How To Create A Hack-Proof Password Dictionary

Password blacklisting, also known as dictionary checking, is a very important security measure to have in place for passwords. Dictionary checking prevents the use of common passwords like Password, Welcome, and Baseball. We all know these passwords and insecure and ineffective to secure a computer. Therefore, why are we allowing these passwords on our network? […]

Read more

How To Turn Off LM Hash And Only Use NT Hash

You might be wondering how to prevent Windows from storing a LAN manager hash of your password in Active Directory and local SAM databases. The LM hash is the Windows Active Directory default option for storing passwords that are 14 characters or less. This method is unsafe and should be turned off. When a user […]

Read more

Benefits Of The nFront Password Filter

Are you contemplating the purchase of the nFront Password Filter? Well, look no further! Password security is too important of a topic to be taken lightly these days with the advanced technology that hackers have available for their use against you.Below are eight reasons why you need the nFront Password Filter on your network today! […]

Read more

The Secret Is Out… Here’s My Password

Have you ever wondered what the passwords are like for employees at an IT Security Company? Well, look no further! I am letting you know my password and how I created it. Of course, I did change it once I posted this infographic! Password Security should be one of your top priorities this year to […]

Read more