(360) 944-5111

(503) 980-3111

Posts Tagged ‘vulnerability scanning’

KRACK Attack – WiFi Vulnerability

Krack Vulnerability

The latest in technology security threats comes in the form of KRACK Attack, which stands for Key Reinstallation Attacks. The KRACK Attack vulnerability affects nearly all WPA and modern WPA2 WiFi protocols. What is the KRACK Attack Vulnerability? The KRACK vulnerability takes advantage of what’s called the “4-Way Handshake.” When someone tries connect to a network, the 4-Way Handshake negotiates a fresh encryption key. This key will attempt to install on the third step of the 4-Way Handshake protocol, which is when a potential hacker comes in and tries to manipulate the key. How Do You Protect Your WiFi Devices?…

Keep Your Data Safe – 9 Password Security Tips

Password Security Tips

A recent BuzzFeed News article was recently released advising everyone who had a Dropbox account in mid-2012 to change their passwords immediately due to a hacker security breach. Hackers often publish information publically or sell the information on the black market, so it’s important to take steps to protect your accounts. Here are 10 password security tips to help keep your data safe. 9 Password Security Tips to Keep Your Data Safe Choose strong passwords. For help on how to create strong and memorable passwords, check out this blog post. Change your passwords often. Set up reminders and don’t repeat…

Risk #3: Potential Backdoor Threats

Businesses today have to be concerned with external servers where information is stored on cloud servers and on cloud services such as Dropbox or Gmail. Web applications and websites are exposed on web servers. Is your internal network open to outside attack? Is your system truly secure from outside threats? Just because you have a patch management process or minimum security policies, doesn’t mean they are effective. Vulnerability scanning is the only way to provide the visibility to protect your systems and data. Vulnerability Scans are security assessments that identify known vulnerabilities with the use of automated tools. Protect your…