Analysis of about 61 million passwords from more than 28 million users by Virginia Tech University and Dashlane found that 52 percent of users have identical or very similar passwords for multiple accounts. Even when a breach has been reported and users know their passwords have been compromised, more than 70 percent continue to use those passwords for up to a year.
Credential Stuffing: A New Twist on the Old Password Problem
The Clock Is Ticking on Windows 7. What’s Your Migration Strategy?
Cloud Challenges
Cost, security and performance issues can make public cloud usage tougher than expected.
It’s relatively easy to get started using public cloud platforms. Users with no special technology skills can move data in and out of the cloud or use cloud-based applications by doing hardly more than moving sliders and clicking a few buttons.
Wi-Fi Gets an Upgrade
Long-awaited protocol updates boost security and simplify IoT connections.
When the first Wi-Fi protocol was released in 1997, it set the stage for a remarkable shift in the way people work and the devices they use for computing and communication. Wi-Fi now moves more than half of all Internet traffic, and it has helped make mobile the primary digital platform for business users in the U.S.
However, this shift has also introduced some risk.
How to Minimize the Risk and High Cost of Software Piracy
The State of Endpoint Risk: More Sophisticated Attacks, Less Confidence in Security
There is virtually universal recognition of the risk created by constantly evolving, increasingly dangerous cybersecurity threats. But even the most deep-pocketed organizations with the most talented security teams and advanced security tools continue to make headlines because their systems were compromised.
Are Your Company Assets for Sale on the Dark Web?
In addition to conjuring up images of dark alleys, scary forests and evil beings that you would see in a horror flick, the dark web implies that there are two “webs.” You have one that everyone accesses daily for personal and professional use, and one in a mysterious underworld that you should avoid at all costs.
What Would Happen to Your Business if a Disaster Struck Tomorrow?
Business is booming. Customers are happy. Employees are happy. Everything is humming like a well-oiled machine. You have an unblemished reputation. What could possibly go wrong?
Well, everything.
All it takes is one disaster – one fire, one hurricane, one flood, one hack, or one disgruntled employee with an axe to grind – to send the entire operation into a tailspin.
Full Speed Ahead
Addressing the Data Tampering Threat
File integrity monitoring helps ensure that critical system and data files aren’t altered — maliciously or accidentally.
Most organizations associate the term “security breach” with the theft or exposure of sensitive data. However, data tampering could pose an even greater threat, according to leading security experts.



