At NorthSky Technology, we’ve long been hesitant to recommend strict password expiration policies to clients. Until relatively recently our hands have been tied on this issue, as most security Read more
The risk of email compromise is a constant, attackers more efficient than ever at finding ways to break in and gain access to your account. The two most common threats are: A) Attackers find Read more
You may have seen a recent news headline about critical vulnerabilities being found in just about every modern CPU (computer processor) manufactured in the last decade. These fall into two Read more
This morning, a new set of vulnerabilities in the WPA2 protocol were publicly disclosed after an embargo period which gave vendors an opportunity to work on security patches to address the problem. Read more
What is it? This morning, a new vulnerability in the Apache Web Server called Optionbleed was publicly disclosed. This vulnerability allows for a remote attacker to potentially take control of an Read more
Traditionally, access to computers, websites, and systems have been dependent on two things: a username and a password. The username identifies who you are, while the password authenticates that you Read more
Social security numbers, dates of birth, and driver’s license numbers were never designed to be used as universal passwords to authenticate consumer identities. Despite this, they’ve been widely Read more
You likely saw the news yesterday about the Equifax data breach compromising the personal information of as many as 143 million Americans. (If not, check out the details here: Giant Equifax data Read more
While only a few make the news, organizations across the world are being breached every day with over 7 billion credentials and identities leaked in the last decade. In 2012 and 2014, breaches of Read more