We’ve all got password fatigue, but are NIST’s new policies wise?

Posted by:

Ah the necessary evil of passwords.

Those of us who have worked in organizations that require users to change passwords at set intervals know what I mean.

Typically every three to six months, users are requested to perform a password change – maybe in the form of an annoying pop-up alert. In some setups, the user is lock out of the system until a new memorable password (but one that follows the complex password creation guidelines) is set.

A ...

Read More →
0

WannaCry’s Kill Switch won’t work for proxy users. Patch now.

Posted by:

News reports published this Monday morning claim the WannaCry ransomware worm managed to spread to 150 countries, with 200,000 computers successfully attacked.

The attackers, according to their Bitcoin accounts, seemed to have raked in  an initial fee of $300 to decrypt the files being held for ransom, but that is set to double in three days. 

Whatever they end up with (and here’s hoping it’s a criminal record) it seems like a measly return considering the impact this ransomware worm ...

Read More →
0

Everything You Need To Know About WannaCry – Right Now

Posted by:

What is WannaCry?

WannaCrypt, aka WanaCrypt0r 2.0, WannaCry and WCry, is a new ransomware that hit over 74 countries in the last 24 hours, which spreads like a worm by leveraging a Windows vulnerability (MS17-010) that has been previously fixed by Microsoft in March of this year.  WannaCry is a form of “ransomware” that locks up the files on your computer and encrypts them in a way that makes them unavailable to you anymore.

The express train speed with ...

Read More →
0

Cyber attack video simulations: NEVER trust default security settings again

Posted by:

If you work in an organization that values its digital data and a good relationship with suppliers, partners and customers, I am willing to bet you have a number of cyber defenses in place.

Your web access will be likely protected by a robust firewall. Your wireless can perhaps only be accessed via a unique login. Maybe you even encrypt data that you store.

I bet you also ensure vulnerabilities are patched regularly, and ...

Read More →
0
})
SEC Cybersecurity Exams