Tag: password-manager

Passwords, King of Authentication: Long Live the King!

This post is a reproduction of an article I wrote that was originally published in  Business Computing World . “When you play the Game of Thrones, you win or you die”. One thing that we have learnt from the popular TV show and books is that no one is safe on the throne for long before a younger, stronger, and more entitled claimant comes along to throw you off

Why MSPs Should Take Extra Care in Managing Client Passwords

Passwords on spreadsheets put client networks at risk, along with Managed IT service providers’ credibility and trustworthiness. Managed IT Service Providers (MSPs) deliver a variety of IT and network management services to their clients. In particular, small and medium organizations are increasingly relying on MSPs to manage part or all of their IT services

Fully Controlled and Closely Monitored Remote Access, a ​Critical Aspect of DCIM

Without proper data center remote access management, administrators invite security issues and waste time.  With more organizations adopting cloud computing and virtualization, data center operations have been proliferating across the globe. This trend creates multiple challenges for data center administrators in IT organizations

​The Heartbleed Bug: How to Mitigate Risks with Better Password Management

– – – – – – – – – – – – –  – – –  – – –  – – – – – – – – – – – – – – – – – – – – – – – – – – – – –  – – – – – – – – – – – – – – – – – – As the dust begins to settle down on the Heartbleed bug, it is time to critically assess the password management practices in your organization.

IT outsourcing: When outsiders become insiders, how do you ensure information security?

Organizations outsource a part or whole of their IT services to third-party service providers for various reasons, such as cost savings, leveraging outside expertise, need to meet business demands quickly, and other critical aspects. Usually, tasks such as software development, network management, customer support, and data center management are outsourced

Beware, your social media password could let your business down!

Social Media emerges the most convenient platform for cyber-criminals; Using same password across social media and business applications makes your business vulnerable to attacks! Over 12 per cent of the world population is on social network and the number keeps growing exponentially. Those who do not own an account in Facebook or Twitter are now being viewed as those living in prehistoric times. No doubt, social media is wonderful in helping you stay connected with friends, but the sheer popularity of social media attracts the attention of cyber-criminals looking for ways to harvest identities.

Could Your Jewelry Stop Hackers?

Google has been talking about an innovative idea to replace passwords with jewelry — that’s right, jewelry. Actually, the enabling technology could be  hidden in jewelry, such as a ring , which would perform secure cryptographic transactions that would obviate the need for the user to enter a password.

6 mobile security screw-ups you’re (probably) guilty of

In two weeks, the security community will flock to San Francisco for this year’s RSA Conference. With two-thirds of Internet users now accessing the Internet via their mobile devices daily and mobile malware reportedly  up over 185 percent in 2012 , the hottest topic on the docket is mobile security