Archive | Password Policy RSS feed for this section

How To Smoothly Implement A Strong Password Policy

Changing your company’s password policy can create a high level of apprehension for the IT department as well as management, especially when the password policy will become more restrictive for end-users. Your company’s management team will have the primary concern of how to deploy a new software tool effectively to the entire network. While your […]

Read more

Why You Don’t Need A Password Manager

OneLogin announced on May 31, 2017, that their company was hacked between the hours of 2:00 am to 9:00 am PST. No big deal, right? Wrong. OneLogin is an online service that lets users manage their multiple different logins and passwords with a single sign-on (SSO). Essentially, OneLogin is a password manager that entices customers […]

Read more

Say Goodbye To Windows Hello

What is Windows Hello? Windows Hello, according to Microsoft, is a more personal way to authenticate your computer using either your face, fingerprint, or iris. The technology is equipped with the Surface Book, Surface Pro 4, and some PCs. For example, you will hold your head still in front of your computer’s camera and it […]

Read more

We Support Carnegie Mellon University’s Password Research

Carnegie Mellon University released a study in 2013 called “Measuring Password Guessability for an Entire University.” CMU has over 25,000 faculty, staff, and students with a single-sign-on password. With this research study, CMU wanted to analyze how guessable the passwords would be in a password attack by standard password cracking tools and algorithms. A standard […]

Read more

Making An Informed Decision To Protect Your Network

Humans are very predictable and unless we see our company’s name plastered across every news channel and online search engine due to a data breach, we will probably assume our company’s network is safe and we are doing a decent job protecting it. Companies may slide by for years and not be on a hacker’s […]

Read more

Put Password Rules In The Hands Of The User

This topic might seem to alarm you since the fate of your company will be placed in the hands of your employees. When I talk to many prospective customers of nFront Security, I hear the common problem of end-users selecting the company name, seasons (Summer, Winter, Fall, and/or Spring), months (January, February, March, etc.), or […]

Read more

Hacker and Cyber Insurance 101

Let’s talk about insurance and what it’s actually intended to do. According to Google’s dictionary, insurance has two meanings: 1. A practice or arrangement by which a company or government agency provides a guarantee of compensation for specified loss, damage, illness, or death in return for payment of a premium. 2. A thing providing protection […]

Read more

Common Mistakes of IT Administrators

At nFront Security, we believe that providing tips and checklists are a great way for IT Administrators to know if they are forgetting about any important security measures that might have slipped their mind. There is a famous quote that reads: “Rename your ‘To-Do’ list to your ‘Opportunities’ list.” – Steve Maraboli Here are a […]

Read more

How to Prepare for your Annual IT Audit

An IT audit is the review and evaluation of your company’s IT infrastructure, policies, management, and any related processes. Sometimes IT audits coincide with the annual financial audit. IT audits are very important because it will let you know if your company is being adequately protected by your systems in place. It can also help […]

Read more

How To Turn Off LM Hash And Only Use NT Hash

You might be wondering how to prevent Windows from storing a LAN manager hash of your password in Active Directory and local SAM databases. The LM hash is the Windows Active Directory default option for storing passwords that are 14 characters or less. This method is unsafe and should be turned off. When a user […]

Read more