Alisanne Steele | TheSoftwareConsultant | Tuesday, April 3, 2018 There is a ton of information out there about how to create that perfect password. As long as you follow the rules, your password should be strong and un-crackable. Or at the very least, your password should be strong enough to outlast a few rounds of brute force attacks…
Posts published in “Social Engineering”
Alisanne Steele | TheSoftwareConsultant | Saturday, April 7, 2018 Phishing: Phishing is the act of sending out malicious emails and has caused over $1.2 billion in loss. These malicious emails can be highly targeted and involve an extensive amount of planning. A successful phishing campaign can create a depressing ripple effect. Phishing often targets small professional firms relying…
Alisanne Steele | TheSoftwareConsultant | Wednesday, February 28, 2018 Bring your own device (BYOD) policies are becoming a more frequent topic of discussion when reviewing current IT & Documentation needs with our clients. Staff are bringing their devices to the workplace more and more frequently, and connecting (When possible) to your environments. Why not work with that…
3 ways hackers use your employees to their advantage
Alisanne Steele | TheSoftwareConsultant | Wednesday, February 22, 2018 Cyber criminals don’t just slip into your network with the help of some serious hacking skills. In fact, there’s a much simpler way to do that… through your employees. Social engineering is a tactic hackers are using more and more frequently to infiltrate systems. It involves a variety…