by Stronger | Dec 30, 2015 | Cyberattack, IT Security
Protect your IT systems from terrorist exploitation It often seems like the fight against IT attacks is a losing battle. No matter how secure your firewalls, how strict your IT security policies and how diligent you are to recognize anomalies, hackers find a way in....
by Stronger | Dec 1, 2015 | Cyberattack, Hacking, Pen Testing
As technology becomes more commonplace in higher education, the call for increased measures to protect student privacy grows louder. Members of Congress and many in the higher ed community are calling for an update to the more than 40-year-old Family Education Rights...
by Stronger | Nov 25, 2015 | Cyberattack, Hacking
“Every day, all over the world, computer networks and hosts are being broken into. The level of sophistication of these attacks varies widely; while it is generally believed that most break-ins succeed due to weak passwords, there are still a large number of...
by Stronger | Nov 16, 2015 | Authentication, Biometrics, CHAP, Cyberattack, Hacking, Kerberos, Pen Testing, RADIUS, VPN
Some of the largest data breaches of the last two years, including those affecting Target, Home Depot and the U.S. Postal Service, have been the result of hackers gaining access through Virtual Private Networks (VPNs). Between vendors, contractors, employees working...
by Stronger | Jul 17, 2015 | Cyberattack, Hacking
Reported cyberattacks on health care organizations have increased 40 percent since 2013. The increase in the sector is a combination of three factors. First, medical records theft is not discovered as quickly as other types of data breaches. Second, health care...
Recent Comments