FAQ Category: Infrastructure Solutions

How Do You Prevent Data Loss?

Since ALL tape backups will fail at some point in time, organizations are quickly learning that tape is not always an adequate form of data backup. Tape drives can malfunction without showing warning signs, become corrupted due to accidental misformatting, mishandling, heat, or being hit by a virus, and this can make it impossible to […]

What is Business Continuity (BC)?

“Business continuity,” or “BC,” is the way that a business can maintain regular operations during an outage or systems malfunction. “Business continuity” should not be confused with “disaster recovery.”

How Can I Protect My Company Against Rogue Access Points?

It is important to check your Wi-Fi network frequently to see if any unapproved access points have been added to the system.  Companies should keep a list of approved access points in a managed access point list, and should check if they are connected to the secure network. If necessary, Storcom can help add wireless […]

What are Popular Passwords and Why Shouldn’t I Use Them?

Passwords are typically chosen by employees, and there is a lot of room for error in this since humans believe that passwords must be easily remembered. People tend to choose passwords based on information about themselves or their lives, and such passwords are more popular because they’re easier to remember than a string of nonsensical […]

Why is a Rogue Access Point On My Company’s Wi-Fi Network?

In this day and age, network security should be of the utmost importance. This is why rogue access points should be identified and dealt with accordingly. A rogue access point is a wireless access point that has been added and installed on a secure network without the network administrator’s explicit consent. A well-meaning employee very […]

What is Social Engineering?

Although it sounds somewhat ridiculous, hackers are extremely adept at exploiting the good and trusting nature of other human beings in order to con someone into giving them their passwords. This technique is defined by the term “social engineering.” The most common way of utilizing this technique is when a hacker simply asks for a […]

What is Authentication Bypass?

Authentication bypass is when someone is able to access a system or application without being authenticated. Since the whole foundation of authentication is based upon making sure that authorized users are the only ones accessing an application or a system, it is paramount that the system or app has authentication status of a user.  If […]

What is Weak Authentication?

Authentication is the process of having to prove your identity to an application or system in order to demonstrate that you are who you say you are. Weak Authentication describes when in the strength of the authentication mechanism is relatively weak in comparison to the value of the assets that are being protected. It also describes […]