Credential Stuffing Attack Prevention

Credential Stuffing Attack Prevention

Reusing passwords on multiple logins lead to this cyber attack.

Cybercriminals use stolen login credentials (username and password) in an attempt to log in to other websites in a hacking strategy called credential stuffing. Hackers used this tactic to reveal over 500,000 sets of valid login credentials to Zoom recently. So what can be done to increase credential stuffing attack prevention?

Dave HansenCredential Stuffing Attack Prevention
read more
Security Assessments Critical to Business

Security Assessments Critical to Business

What you don’t know can hurt your business.

Will a ransomware attack shut down your business? Or perhaps you or someone on your staff has confidential information like credit card numbers, social security numbers or ACH account information stored on the computer. Has your password been compromised and is now for sale on the Dark Web? If you don’t know these answers, a network security assessment will provide you the knowledge you need to be secure.

Dave HansenSecurity Assessments Critical to Business
read more
The Big, Bad Wolf of Cyber Crime

The Big, Bad Wolf of Cyber Crime

I like to tell a little story when I describe the importance of cybersecurity in your business.  Imagine you have a pile of cash that you use to buy all the things in your life that you need to survive. You buy your food, pay your utility bills, pay for your home. You use it to purchase everything else you need to continue living your current lifestyle. Pretend for a moment that there are no banks so everything you need to purchase you pay for from this stack of money. Are you with me?

Dave HansenThe Big, Bad Wolf of Cyber Crime
read more