Remove Authentication Remove Firewall Remove Passwords Remove Penetration Testing
article thumbnail

7 Types of Penetration Testing: Guide to Pentest Methods & Types

eSecurity Planet

Penetration tests are vital components of vulnerability management programs. In these tests, white hat hackers try to find and exploit vulnerabilities in your systems to help you stay one step ahead of cyberattackers. Here we’ll discuss penetration testing types, methods, and determining which tests to run.

article thumbnail

How to Perform a Firewall Audit in 11 Steps (+Free Checklist)

eSecurity Planet

A firewall audit is a procedure for reviewing and reconfiguring firewalls as needed so they still suit your organization’s security goals. Auditing your firewall is one of the most important steps to ensuring it’s still equipped to protect the perimeter of your business’ network.

Firewall 105
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cybersecurity Research Topics for Beginners: Exploring the Fundamentals

CyberSecurity Insiders

Password Security: Investigate different password security techniques, such as password hashing algorithms, two-factor authentication (2FA), and biometric authentication. Research network security mechanisms, such as firewalls, intrusion detection systems (IDS), and virtual private networks (VPNs).

article thumbnail

GUEST ESSAY: 6 best practices that will help protect you company’s digital assets in the cloud

The Last Watchdog

Related: Why identities are the new firewall. Vulnerability scanning and penetration testing can help to identify weaknesses and areas where networks have not been configured correctly. Take password security seriousl. Multi-factor authentication (MFA) can also be used to provide an additional layer of protection.

article thumbnail

Retail giant Home Depot agrees to a $17.5 million settlement over 2014 data breach

Security Affairs

“Retailers must take meaningful steps to protect consumers’ credit and debit card information from theft when they shop,” said Massachusetts AG Maura Healey. ” .

Retail 118
article thumbnail

16 Remote Access Security Best Practices to Implement

eSecurity Planet

Keys, such as strong passwords, unique codes, or biometric scans, can be given to trusted individuals to access your resources from a distance. The technologies for secure remote access can range from VPNs and multi-factor authentication to more advanced access and zero trust controls. Avoid using default or simple-to-guess passwords.

article thumbnail

What do Cyber Threat Actors do with your information?

Zigrin Security

For a detailed threat actor description do not forget to check out our blog article about selecting between black-box, white-box, and grey-box penetration tests and also you would know which pentest you need against a specific threat actor. Avoid using easily guessable passwords such as your name, birthdate, or “password123.”