How do we build secure IoT infrastructure?
Posted on 22 March 2017 by
There’s been a lot in the news lately covering security problems related to the IoT. It’s now more important than ever that we ensure a secure infrastructure is in place.
Posted on 22 March 2017 by
There’s been a lot in the news lately covering security problems related to the IoT. It’s now more important than ever that we ensure a secure infrastructure is in place.
Posted on 10 May 2016 by
According to the 2016 Verizon DBIR, 63% of data breaches exploit static passwords. In our experience, multi-factor authentication implementation is easy.
Posted on 22 March 2016 by
Why is strong authentication used? How does it work? And why choose one form of authentication over another? If you’re inundated with information, and are trying to drill down to the bare basics, this cheat sheet will help you make sense of it all. For the sake of brevity, the Cheat Sheet will be rolled […]
Posted on 09 February 2016 by
Even though the Fraternal Order of Police (FOP) website apparently harbored sensitive data such as police officer contracts and officer-to-officer correspondence, it was likely never required to ensure strong encryption to protect its sensitive data nor strong authentication to secure member access.
Posted on 11 November 2015 by
After a list of Comcast email accounts were offered for sale in an underground store, consisting of customers’ Comcast email addresses and associated passwords, Comcast—one of the largest providers of cable, internet and phone services in the US—forced a password reset on those accounts. Of the 600,000 accounts offered for sale, 200,000 were found by […]
Posted on 12 January 2015 by
With new mobile devices like the iPhone 6 and Apple iPad Air 2 topping many present lists this year, we’ve compiled top tips to help businesses ensure they haven’t unwrapped mobile security threats over the festive period.