Objectives Examine what attributes good passwords share by looking at how passwords are compromised. Mitigate the threats posed by each method of compromise. Executive Summary For anyone who came here looking for a one-word answer, this is it: length. There is a saying for passwords,
Foundations: What makes a good password?
You Don’t Have to Run Faster Than the Bear
“You don’t have to run faster than the bear to get away. You just have to run faster than the guy next to you.” – Jim Butcher There is a horrible truth in cybersecurity: you do not need to be unhackable -- you only need
We’ve Got a Guy
“We’ve got a guy. We’re good, thanks.” - Just about every small business owner when asked what they are doing for IT. We do not do a lot of cold (or even lukewarm) calling, but on the rare occasion we do, a common response is,
Information Technology Challenges Faced by Every Small Business (Including Yours)
Managing Information Technology in Small Business is Hard Your small business has most of the same technology needs and challenges as a large enterprise. Unfortunately, solutions developed for the enterprise market are seldom available at all to small businesses, and when they are available they