Author: 3-Hat Information Security

3-Hat Information Security > Articles posted by 3-Hat Information Security

Good methods for increasing password security. Passwords are critical components of both offline and online security. The usefulness of passwords has seen password-based authentication implemented in almost every aspect of computer operation. As such, it is paramount to understand to make strong memorable passwords. In this article we will be discussing password complexity, password length, password storage, passphrase usage, password...

Read More

Redundant methods for user validation. Definition             Multi-Factor Authentication refers to any supplemental methods of user validation by which the user is required to provide additional information to substantiate their claims of authenticity. This is separate from backup authentication, such as password and username recovery services. The Good Reasons To Implement Multi-Factor Authentication             There are many reasonable arguments...

Read More

Start with best practices to keep your wireless networks safe and secure. Wireless access points are everywhere, and unfortunately a large number of them are compromised. Through utilization of war-driving databases and wireless key leaks, wireless access points represent one of the most common avenues for a cyber-attack. In this article we will cover methods for increasing the security of your wireless...

Read More

Start with verifying your email. Email has become the primary means of communication for many businesses over the last few years. Email comes with a myriad of advantages from long term communication persistence, to being accessible from almost anywhere on earth. Email is one of the oldest standardized protocols for network communication that is still in use. This may explain why it...

Read More

Password Managers or better yet, PassPhrase Managers Password management has nearly become a requirement for the effective use of online services. With almost all online services requiring a distinct username and password for registration, there is often the temptation to reuse usernames and passwords. Luckily there are tools which can help you remember or even generate unique passwords to help you manage...

Read More