Article Tag

3-Hat Information Security > Posts tagged "Article"

Redundant methods for user validation. Definition             Multi-Factor Authentication refers to any supplemental methods of user validation by which the user is required to provide additional information to substantiate their claims of authenticity. This is separate from backup authentication, such as password and username recovery services. The Good Reasons To Implement Multi-Factor Authentication             There are many reasonable arguments...

Read More

Start with best practices to keep your wireless networks safe and secure. Wireless access points are everywhere, and unfortunately a large number of them are compromised. Through utilization of war-driving databases and wireless key leaks, wireless access points represent one of the most common avenues for a cyber-attack. In this article we will cover methods for increasing the security of your wireless...

Read More

Start with verifying your email. Email has become the primary means of communication for many businesses over the last few years. Email comes with a myriad of advantages from long term communication persistence, to being accessible from almost anywhere on earth. Email is one of the oldest standardized protocols for network communication that is still in use. This may explain why it...

Read More

Password Managers or better yet, PassPhrase Managers Password management has nearly become a requirement for the effective use of online services. With almost all online services requiring a distinct username and password for registration, there is often the temptation to reuse usernames and passwords. Luckily there are tools which can help you remember or even generate unique passwords to help you manage...

Read More

Network Isolation and the benefits of implementing a DMZ     Due to the interchangeability of terminology used in this article, the word "server" will be referring to the physical or virtual hardware and the operating system which is hosts. Whereas the word "service" will refer to any additional software which serves a dedicated role in the network.     At some point, every network engineer encounters a situation where they...

Read More

Testing and Patching: The Advantages and Risks of Both     Security vulnerabilities will eventually impact every publicly accessible system given enough time. It is unreasonable to expect over a thousand programmers to perfectly cooperate with each other and manage a code base of gigabytes of code written in different languages so perfectly that no vulnerabilities are ever created. Luckily, most software engineering firms are willing...

Read More