The Latest in IT Security

Eliminate Weak Passwords With Regular Auditing

17
Aug
2016
Eliminate Weak Passwords With Regular Auditing

eliminate-weak-passwords-with-regular-auditing-938x535

End user auditing consists of ensuring security policies — such as password requirements — and due care is provided to sensitive documents.

Clients regularly ask IBM’s X-Force Incident Response team to scan their networks for intrusions, malicious activities or other risk factors. One such risk factor that we look for is the use of weak passwords. As countless security compromises have shown, weak passwords are a common root cause for the initial breach of a victim network.

Read More

Leave a reply


Categories

SUNDAY, AUGUST 18, 2019
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments

Social Networks