Category: Cyber Intelligence

What is two factor authentication

Authentication is how you identify yourself to a online service or website, a computer, or another technical system.  Authentication is measured in factors.  The most common mode of authentication is simple that uses a username and a password.  This factor of authentication is “something you know”.  Two factor authentication uses multiple factors to authenticate yourself

Securing Service Accounts

Service accounts are accounts used to run a particular service. They will commonly be created as part of an application’s installation procedure and have a few characteristics that can lead to significant security risks: Passwords are hard to change Single account will have access to numerous systems Accounts are often privileged A service account logs

Poorly written code exposing businesses online

Old and sloppily written code is exposing businesses to hackers, new research has warned, with the financial sector at the highest risk. After reviewing more than 278 million lines of code in 1,388 applications worldwide, researchers have found 1.3 million weaknesses which could allow hackers to take advantage of corporate systems. Research by software company

Know your cyber business threats

Most Common Cyber Threats Phishing   Phishing is an act of deception in which bad actors aka hackers endeavor to secure personal data, for example, usernames, passwords and credit card numbers or bank accounts. They aim to lure or lead people to fake websites where they trick their victims into providing their personal information. Generally,