Anchor Cyber Blog

The 4 Most Important Firewall Configuration Rules

Posted by Matt Harvey on Aug 4, 2017 5:08:29 PM

If anti-virus is the most basic control people think of in securing a computer, then firewalls serve the same role in network security. To many laypersons, “firewall” is synonymous with network security. But it was not until the late 1980s that practical network packet filters were introduced, allowing organizations to connect two networks while controlling what types of traffic were allowed, to which endpoints, and in which directions.

Read More

Rethinking Password Policies

Posted by Matt Harvey on Aug 4, 2017 5:05:03 PM

Passwords are perhaps the oldest and best-known security technologies in use today, as well as perhaps the most hated and despised. Security professionals dislike passwords because they often provide woefully inadequate security, and users hate them because they are hard to remember and manage. Security policy requirements often exacerbate this situation by imposing arcane requirements for password "complexity" and by requiring users to change passwords frequently (just when they are really, solidly stuck in our memory).The latest publication from the National Institute of Standards and Technology (NIST) on the topic of authenticators (NIST Special Publication 800-63B) advances some exciting ideas that run counter to the typical ideas about how passwords should be chosen and managed:

Read More

Thoughts on Password Managers

Posted by Matt Harvey on Aug 4, 2017 5:04:11 PM

Let us discuss the importance of using strong, complex passwords, and being diligent to use different passwords for everything. Most of us can agree that is good advice, but many of us don't follow it. The reason is simple: it is too hard to remember all those passwords!

Read More

5 Options to Secure Your Personal Email Account

Posted by Matt Harvey on Sep 16, 2016 2:31:00 PM

Former Secretary of State General Colin Powell became the latest public figure to have his personal email account hacked and his messages exposed publicly, to great embarrassment to himself and others. He joins a long list of political, government, and entertainment figures who have endured this same fate. Organizations cannot ignore the potential impact of such an incident occurring to one of their personnel, especially senior management in highly visible roles.

Read More

7 Mobile Device Changes That May Save Your Data or Job

Posted by Matt Harvey on Sep 6, 2016 9:56:00 AM

In many organizations, more and more work is being conducted via “mobile devices” like smartphones and tablets rather than traditional PCs and laptops. The most common of these by far are those running Apple’s iOS (iPhones and iPads) and those running Google’s Android OS. These devices are light, portable, convenient, handy, and generally easy to maintain and manage. However, they are still powerful computing devices that can store a lot of critical information and can also present serious security challenges.

Read More

Cybersecurity news,
tips and tricks written
by experts for you

This blog will provide a series of short postings which will provide a quick view into the latest and most relavant security issues, vulnerabilities and tips for you to focus on. It ssaves you from searching dozens of other pages to determine what information is more relavant and needs to be focused on first.

Remember:

  • Check back weekly
  • Sign up for our newsletter
  • Patch consistently and often

Subscribe to Email Updates