article thumbnail

CIOs Look For Ways To Fool Hackers

The Accidental Successful CIO

This new method doesn’t attempt to bar intruders from getting in, like firewalls do. When the false information gets tampered with, the company is alerted and can choose to either kick out the bad guys or isolate them from the rest of the network to study their methods. The ultimate goal would be to better identify them in the future.

Firewall 130
article thumbnail

How Can CIOs Get Everyone To Create Strong Passwords?

The Accidental Successful CIO

Studies that are done about the passwords that people choose show that “12345678” is always the most popular one. What they did was to tell study participants that the stronger the password they came up with, the longer they could keep using it. However, nobody seems to do the right thing.

Research 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Research: 15 Billion Credentials in Circulation for Cybercriminals

SecureWorld News

A 15 billion-strong treasure trove, according to a new study from Digital Shadows. Its recent study, "When Exposure Becomes Game Over," revealed some shocking statistics about account takeover during the last two years. But bank account details are also common. Deploy an online Web Application Firewall.

article thumbnail

CTOvision Interviews RADM Paul Becker, Director for Intelligence, Joint Chiefs of Staff, On The Cyber Threat

CTOvision

But studying the potential adversaries in cyberspace can help you prepare in other, more strategic ways. Studying adversaries and what they want can inform key decisions before and during attacks. Are those the kind of things you mean we should be studying? stock exchanges, seizing assets, freeze bank accounts, close U.S.

Strategy 150
article thumbnail

Ingenious Phishing Tactics in the Modern Scammer's Toolbox

SecureWorld News

In the upshot of this trickery, the extracted file quietly runs a banking Trojan on the target's device. Enable a firewall and use reliable enterprise-grade internet security software equipped with anti-phishing controls. If you are a company executive, set up a phishing awareness training program for your employees.

Google 95
article thumbnail

The Hacker Mind Podcast: Cyber Ranges

ForAllSecure

A red team would be the enemy and they’d study your network and try to exploit any weaknesses. So I think the value of a red team is super important in many organizations that we work large banks, deities that have the red teams to measure a point in time of the organization itself. And then you’d compare notes.

Banking 40
article thumbnail

The Hacker Mind Podcast: The Internet As A Pen Test

ForAllSecure

We do the same thing for firewalls. The Russia Ukraine scenario, although let's not downplay the lies, that it's affecting the strife, it's causing economic damage and everything else but it is, amazingly enough, staying in this one little localized area, and everyone almost has the ability to treat this like it's a case study.