Unlocking 3 Secrets to a Successful and Secure Organization

The high profile hacking cases seen from last year and the new threats having been announced during this year, security and online safety has become a significant concern for most corporations. Businesses would like to keep their data and information safe and secure, however they are afraid of the high costs that are associated with
Continue Reading »

3 Password Misconceptions to Avoid

Passwords are a hassle but a necessary one in order to keep information and data safe. This is especially crucial for any organization that records and stores sensitive information – credit card numbers, social security information, customer data – but as we’ve seen in the last few years, these things can be susceptible to weak
Continue Reading »

What is Identity Management?

It can be seen that due to the growth of technology, online and offline identities have become intertwined. This is a result of individuals having an online personality that is different from their offline one. The internet is a vast world of varied identities and sometimes such represented identities may not coincide with what has
Continue Reading »

What is Password Synchronization?

Passwords. Sometimes it’s the only important attribute that stands between your important data, information and a hacker. We’re told time and time again that we need stronger and robust passwords as this will prevent cyber-attacks, and yet we continue to use easily guessed passwords (though we’re getting better). Edward Snowden exposed the NSA for questionable
Continue Reading »

Cyber Security is an Important Factor for Businesses

We’ve reached the middle of the year where businesses have begun to take their data security more seriously. A reason to this can be the increased number of attacks taking place. A recent report done by Cisco outlines that employees are still an easy target when it comes to cyber-attacks and protecting data. A leading
Continue Reading »

The United States’ Network Neutrality Ruling Puts a Focus on Data Management and Security.

A recent order for Internet broadband service providers adopted in February by the U.S. Federal Communications Commission may have large scale implications not only from a data management position, but also from a network security standpoint. At the very least, ruling may offset potential overhead cost escalations that the alternative may have caused for many
Continue Reading »

Access Manager 1.1: End of Life

In June 2014, Nervepoint Technologies released Access Manager 1.2; it provides a new user interface, support for multiple types of user databases, as well as a range of exciting new features. It can be seen that the Version 1.2 is now a unique product in comparison to Version 1.1. What is more, 1.2 features and
Continue Reading »

What Are SSL Certificates?

If you’re a user of Mozilla products, like Firefox or Thunderbird, you may have heard that the company will stop trusting unknown SSL certificates, citing these types of certificates are cryptographically unsafe. The type of certificates they are denying at the 1024-bit keys however, websites that have 2048-bit keys are fine and are up to
Continue Reading »

Going Phishing in Banking

The headlines can be seen everywhere: Hackers’ $1 billion bank theft may still impact consumers, JPMorgan and Other Banks Struck by Hackers, How safe are you and your bank from cyber attack? Morgan Chase warned that cyber attacks are growing every day in strength and velocity across the globe. He said, “It is going to
Continue Reading »