Authlogics detect shared and breached passwords offering priority protection BRACKNELL 18th FEBRUARY 2021 – The COMB (Compilation of Many Data Breaches) data breach consists of many previous data breaches that include large companies like LinkedIn, Hotmail, and Netflix culminating in over 3.2 billion compromised credentials (emails and passwords) being reported. The victims of this breach..
No-one could have predicted how 2020 was going to pan out when we welcomed the new year in all those months ago before lockdowns and remote working were part of our daily setup for this year. Many industries have struggled throughout but the technology sector and in particular cybersecurity have never been so busy (well..
Unless you’ve been living under a rock, or aren’t into IT security, you will of heard about the Cit0day breach database dump. Various online news outlets rushed to get their scare tactic reports out, while others took some time to pause and analyze what was found in the breach before commenting. As ever, industry insiders..
Protect yourself, protect your organization, protect your Active Directory With everyone working at home and IT policies under scrutiny as cyberattacks are on the rise, how do you ensure your Active Directory is secure? Time to do an audit to find out! Remote working is key to keeping organizations functional but it can also be..
Definition of Strong: “powerful and difficult to resist or defeat” Definition of Secure: “certain to remain safe and unthreatened” With October being the National CyberSecurity Awareness month, there are many IT Security recommendations on how to stay safe online, to protect what you connect, and to lock down your login. One of the key..
COVID-19 has changed the way we work in 2020 and for the foreseeable future. Working from home is now the new normal and many organizations took advantage of free trials and special offers to secure their workforce as a quick fix at the beginning of the global pandemic. Although, on reflection now, were those deals..
Are you aware of the implications that a ‘phishing attack’ can cause you as an individual as well as your business? Phishing attacks are one of the most common and prevalent attacks that both individuals and companies can suffer from with it leading to identity and password theft. Dating back to the 1990s, phishing attacks..
Awards season is officially upon us, with the Grammys, Baftas, Oscars, Academy Awards, and others already underway, set to bring excitement to the daily coffee break chats in offices across the world. Here at Authlogics, we love the awards season. Yes, there are movie buffs amongst us, but what causes more excitement in our office..
It’s that time of year again, with 2019 behind us, and 2020 stretching far ahead. What’s to come this year is the question that most businesses will be pondering in January. We’ve made some cybersecurity predictions for 2020 and have considered: What do we need to prepare for? What has the potential to catch us..
Oh, data breaches. With every passing day there is another story in the tech news, and often even mainstream news, bringing to light a breach that exposed the personal data of thousands, if not millions of users, as well as the vulnerability of the organisations that should have been keeping it safe. If daily sounds..