Let's Talk
Welcome to the EiQ Networks Blog

Is Changing Your Password Actually Making You Less Secure?

Posted by Trevan Marden on Aug 9, 2016

We’ve recently written a number of posts about the role that passwords and strong authentication methods play in security. Locking down logins and implementing access controls has long been a cornerstone of information security. Most information security professional understand the factors that make passwords strong. For a quick refresher, check out our recent post on the subject. In short, a strong password is typically very long; includes numbers, mixed case, and special characters; includes no words or discernible patterns and is definitely not your pet’s name. You should also never reuse the password or use the same password across multiple systems.

Strong Password Management is Critical to Network Security

Posted by Security Steve on Aug 3, 2016


Passwords may be one of the most misunderstood elements of network security. The critical importance of the role passwords play in thwarting cybersecurity breaches cannot be downplayed or understated. Weak passwords undermine a company’s network. One of the key points of security tools, such as network security monitoring, is to flag unusual (and therefore suspicious) activity on an organization's computer systems. If passwords are so simplistic that hackers can guess them correctly in a normal number of attempts, then cybersecurity software is much less likely to notice and flag these cybercriminals' efforts.

Even Mark Zuckerberg Gets Hacked: It’s Time to Change Your Password

Posted by Shawn O'Brien on Jun 23, 2016


Cybersecurity failures are so frequent that they even happen to individuals we'd expect to have taken better precautions. That's certainly the case with Facebook founder Mark Zuckerberg, whose social media accounts were hacked due to a poor password. The breach illustrates two common mistakes that many users make when creating account passwords, and why passwords are a crucial part of endpoint security.

6 Videos Every Cybersecurity Professional Needs to Watch

Posted by Security Steve on Jun 2, 2016


In an industry that's constantly evolving, it can be a challenge to stay on top of recent trends. Following cybersecurity news sites and blogs can help educate you about current happenings, but what about the bigger picture? We've rounded up six online videos that cybersecurity professionals should watch in order to become better informed about today's most pressing cybersecurity issues.

Is Your Password Putting Your Company's Security at Risk?

Posted by Vijay Basani on Apr 14, 2016


Passwords are a crucial element in network security, but their importance is often misunderstood. One of the key points of security tools such as network security monitoring is to flag unusual (and therefore suspicious) activity on an organization's computer systems. If passwords are so easy for hackers to guess that they can obtain them in a normal number of attempts, then cybersecurity software is less likely to notice criminals' efforts. But even businesses that do not rely on advanced security tools can still benefit from strengthening their password practices. The following is some basic advice on passwords. But first, a look at the problems.


The 3 Most Common Cybersecurity Mistakes Made by Employees

Posted by Security Steve on Feb 1, 2016


Employees are the lifeblood of an organization, and if they neglect good cybersecurity practices, the company's overall cyber defenses are weakened. Here are three common cybersecurity mistakes employees make—and the best ways to address them.

1. Falling for Phishing

Phishing may be a common scam, but employees are still falling for it. Between late 2013 and August 2015, the FBI found that more than 7,000 U.S. companies were victimized by business email scams—with total losses exceeding $740 million. A single well-written phishing email can confuse employees into clicking a fraudulent link that installs malware on company machines, or can trick accountants into wiring money into false banks accounts purportedly owned by company executives traveling overseas.

7 Things to Do Immediately After a Security Breach

Posted by Kevin Landt on Sep 8, 2015

Dealing with a security breach is like a police officer drawing his or her gun: in all likelihood, you’ll go your whole career without having to do it. But regardless of the unlikelihood, you need to be prepared.


We have come up with seven steps you should take if ever you discover you have been hacked and your company’s data has been compromised.

How to Protect Your Customers’ Personal Data from a Security Breach

Posted by Vijay Basani on Jul 23, 2015

In the last several years, companies large and small have lost their customers’ personal data to hacks at a huge cost, not just in dollars and cents but in the more central currency of trust and reputation. It is integral to your company’s future to demonstrate to your customers that if their info is going to be stolen it sure isn’t going to be through your company’s lackadaisical security measures.

LastPass Breach: Is ‘One Ring to Rule Them All’ Good Security?

Posted by Trevan Marden on Jun 23, 2015


The Worst Passwords of 2014

Posted by Vijay Basani on Jan 28, 2015

SplashData, a company that makes password management software, has released a list of the most common passwords of 2014. The more common a password is, the easier it is for a hacker to breach the password and steal someone’s identity. Of the 3 million passwords that leaked last year, the most common one is “123456,” which was also the most common password of 2013. Nine other passwords on the list were also strings of numbers. In addition, for the past four years, people have been fond of using the word “password” as their password. Sports like “baseball” and “football” are newly common passwords.

Subscribe to Email Updates

How Prepared Are You to Battle Cyber Attacks?

Find out with EiQ's free cyber security readiness assessment!

Find Out Now!

Posts by Topic

See All