Brian

Recent Posts

How to create a great password

Posted by Brian on March 28, 2017 at 11:16 AM

New web leaks are being reported regularly. In the last month Google uncovered what is likely the most troubling leak in 2017. So far. And we're just past halfway through March. The CloudBleed bug may have exposed passwords and other sensitive data from a multitude of sites, including major services like FitBit, Uber, and 1Password. We recommend clients change their passwords at least every six months, and immediately after discovering any vulnerabilities to your accounts.

When changing their passwords, clients often ask what the requirements are. I respond with the common minimum requirements: it must include at least two numbers, two upper case characters, and it must be a minimum of 12 characters long. Unfortunately, that question often indicates an intention to meet the minimum and no more. Although meeting those basic requirements is a good practice, the best practice is having a unique password that exceeds the minimum, that is also personal enough to remember, and that only you will know.

Read More

Topics: Information Technology, Network Security

How Cybercriminals May Be Enlisting Your Computer Into a Botnet Army

Posted by Brian on June 10, 2016 at 4:40 PM

Let’s first of all define ‘botnet’. Botnets - sometimes referred to as zombie armies - are networks of computers infected with malware that force those machines to do a hacker’s bidding without the owner’s knowledge. How-to Geek has a more comprehesive definition - including helpful graphics - than we have time for here.

Over the last two years, a clever botnet program has allowed cybercriminals to take over unprotected computers and quietly generate profit for themselves. Redirector.Paco is the name of the malicious Trojan horse virus designed to

Read More

Topics: Network Security

Don't Miss a Thing!

Subscribe to our blog

Subscribe to our blog

    Recent Posts

    Posts by Topic

    see all