Either someone is doing some serious academic work in researching password strengths, or someone is building a really great hashed password dictionary. The Steam community forum compromise, in which attackers gained access to a database containing usernames, encrypted passwords, and e-mail addresses, is just the latest in a series of compromises targeting a subset of the online community: gamers.
It’s difficult to say whether these attacks are increasing in frequency or whether media reporting and voluntary disclosure has created the illusion of a growing trend. In either case, our activities are continually moving online, often protected only by a username and password, instead of staying safe and warm in hard disks on our home desktop computers. The attack surface is increasing as more web services require more usernames and passwords and the opportunity for password reuse increases. Read More »
The Cisco 5900 Series Embedded Services Routers (ESR) are optimized for mobile and embedded networks that require IP routing and services. They can operate reliably in harsh environments, such as those subject to power surges and extreme weather conditions.
These routers are complemented by Cisco IOS Software and Cisco Mobile Ready Net capabilities. With this technology, they provide highly secure data, voice, and video communications to stationary and mobile network nodes across wired and wireless links.
FIPS-140 is a US and Canadian government standard that specifies security requirements for cryptographic modules. A cryptographic module is defined as “the set of hardware, software, and/or firmware that implements approved security functions (including cryptographic algorithms and key generation) and is contained within the cryptographic boundary.” The cryptographic module is what is being validated. The NIST website contains details on the Cryptographic Module Validation Program (CMVP).
I have to be honest and tell you that we did not approach this particular show with an attitude of ‘Yeah! CIsco has a tablet.’ But I am still being honest when I say…that all changed. This is that story.
Shore up your organization’s password security by following these easy guidelines
Dozens of times every day, your employees perform a simple, yet crucial, task: They enter their passwords to log in to their computers, your local network, and the Internet. Just a few brief keystrokes stand between your company’s network and cybercriminals, identity thieves, and disgruntled employees. Unless employees’ passwords are complex, they’re easily guessed by experienced attackers or by their password-breaking computers. Creating meaningful and secure passwords isn’t as difficult as many people think, and it’s critical to the security of your small business network.
The world is experiencing explosive Internet growth. This growth has challenged businesses to seek a network that adds stronger value and delivers greater intelligence, reliability, security and versatility.
The network is more important today than at any time in history for the future of business innovation. Businesses that invest in an intelligent network are making an investment toward their future.
What platform will your business use to drive that innovation?