protecting end users

Think Forward.

  • Credential stuffing vs brute force

Credential Stuffing vs Brute Force – When Strong Passwords Are Not Enough

Credential Stuffing vs Brute Force Over the past couple of decades, we’ve been constantly reminded to use strong passwords. This was supposed to minimize the risk of an account takeover (ATO) and, more importantly, a full-blown data breach. Strong passwords were supposed to fend off brute force attacks, the most commonly used attack vector to break into [...]

2021-07-30T09:43:42-04:00July 30th, 2021|Cybersecurity, Security|
  • The real danger of compromised passwords

The Real Danger of Compromised Passwords

Every now and then, we receive email notifications warning us that our account might have been compromised in a data breach. In fact, if you have a Google account, you’ve probably seen a list of some non-Google accounts you own that have compromised passwords. If you haven’t been paying attention to these warnings, you really should. Here’s why. [...]

2021-07-27T10:11:20-04:00July 27th, 2021|Cybersecurity, Security|
  • Protecting-End-Users

Protecting End Users from Phishing Attacks

Last time, we introduced you to phishing attacks and explained why it’s something you need to be concerned about, especially in light of its recent resurgence. We promised to discuss how you can protect your end users from them, so here we are. Here are some of the countermeasures you can implement. Educate your end users Of all [...]

2023-03-09T16:39:06-05:00June 9th, 2021|Cybersecurity, Security|
Go to Top