Request Free Consultation

Tags: Hacking

How to Foil Brute Force Password Attacks

How to Foil Brute Force Password Attacks

WordPress administrators take note: According to Microsoft security researcher Ross Bevington, brute-force attackers focus primarily on guessing short passwords to gain entry into protected systems. He found that very few attacks involve access credentials comprised of long passwords, or passwords that use complex character combinations. These conclusions are the result of analysis of data collected […]

Read more
Encryption Backdoors Will Make Us All More Vulnerable

Encryption Backdoors Will Make Us All More Vulnerable

In the aftermath of every terrorist attack or high-profile cybercrime, it is usually revealed by security professionals through the media that the terrorists or criminals used encrypted communications, enabling them to plan and coordinate their activities without raising suspicion among the intelligence and law enforcement communities.

Read more
A Web Application Firewall Provides Essential Protection

A Web Application Firewall Provides Essential Protection

A web application firewall is software that filters out malicious requests and content from your website, which protects your visitors from harm, as well as safeguards your intellectual property and the time and expense that went into developing your website. The firewall software resides on the same server as your website. Among the common types […]

Read more
Do Not Let Employees Bring IoT Devices into Your Workplace

Do Not Let Employees Bring IoT Devices into Your Workplace

Internet of Things (IoT) devices are notorious for their lack of security features, making them attractive to hackers who can use them as soft access points to reach critical systems on the wider corporate network. In addition, these devices may be invisible to corporate IT administrators. For these reasons alone, companies should forbid employees from […]

Read more
What is Multi-Factor Authentication?

What is Multi-Factor Authentication?

Multi-factor authentication, or MFA, adds a second layer of security to your website. It requires an authorized user to not only enter their password, but also a second piece of information only they have access to. An account protected by MFA is virtually impossible to compromise. Even if an attacker somehow discovers your username and […]

Read more
Easy Ways to Tell if Your Website Has Been Hacked

Easy Ways to Tell if Your Website Has Been Hacked

Even if you think you’ve done everything right, there’s always a chance your website will be hacked. If that occurs, the faster you find out and do something about it, the better off you and your visitors will be. An attacker with control of your website can do a lot of damage to your visitors, […]

Read more
Why You Need a Web Application Firewall

Why You Need a Web Application Firewall

A web application firewall is software that filters out malicious requests and content from your website, which protects your visitors from harm, as well as safeguards your intellectual property and the time and expense that went into developing your website. The firewall software resides on the same server as your website. Among the common types […]

Read more
How Do You Know if a Website is Really Safe?

How Do You Know if a Website is Really Safe?

When browsing the web you have probably noticed that many sites have a padlock next to the browser’s address bar. This indicates that the website has been issued a security certificate. If you click on the padlock, you can verify that the website connection is secure and view the source of the certificate. You might […]

Read more
Malicious Microsoft Office Files on Rise, Ransomware Up

Malicious Microsoft Office Files on Rise, Ransomware Up

SonicWall has published the mid-year update to its 2020 Cyber Threat Report, highlighting increases in ransomware, opportunistic use of the COVID-19 pandemic, systemic weaknesses and growing reliance on Microsoft Office files by cybercriminals. The report analyzes threat intelligence data gathered from 1.1 million sensors in over 215 countries and territories. Download the full mid-year update […]

Read more
Skip to content