FAQ Category: Infrastructure Solutions

What are Brute Force Attacks?

Brute Force is the act of simply guessing a password using information that you already know about the user. This includes information like birthdays, phone numbers, pet’s name, and the names of your loved ones. Although it might seem far fetched, hackers often figure out their victim’s password simply by guessing it. This method is […]

What are the Techniques of Shoulder Surfing?

In order to be successful, the hacker needs to be in close proximity to their victims and not look like they are obviously looking at you. This method is very low risk for hackers, since all they have to do is look at your keyboard or screen when you are typing your password into your […]

What is Shoulder Surfing?

“Shoulder surfing” is the act of a hacker looking over your shoulder in order to see what another person is typing. This is a free, low-tech and effective way for hackers to gain access to your password.

What are Dictionary Attacks?

Dictionary attacks are in addition to brute force attacks. These include password cracking tools that have the ability to test a catalogue of passwords. This is known as a dictionary attack, since the file that is used may actually be a catalogue of dictionary words. Passwords with dictionary words are considered weak since they can […]

What are the Different Types of Hacking?

Hackers can access your passwords in a multitude of different ways. The most common methods are shoulder surfing, social engineering, dictionary attacks, and just attempting to guess passwords from information about the user that’s available to them. Email hijacking is widespread. Hackers, spammers, and social engineers taking over control of people’s email accounts (and other […]

What are the Risks of Rogue Access Points?

A rogue access point very well could be installed by an employee who has good intentions, but there is also a chance that one has been added by a malicious attacker. Rogue access points can create a vulnerability in an organization’s network which leave companies open to DoS and data theft attacks. If a rogue […]

What is a Rogue Access Point?

In this day and age, network security is of the utmost importance. This is why rogue access points should be found and dealt with accordingly. A “rogue access point” is a wireless access point that has been added and installed on a secure network without the network administrator’s explicit permission.

What is Signal Strength?

“Signal strength,” also referred to as “coverage,” is the most basic requirement for a wireless network. To put it simply, signal strength is defined in dBM (decibel milliwatts) to determine the strength of a wireless network. As a general guideline, low signal strength means unreliable connections and low data throughput. While it is confusing, wireless […]

What is a Post-Installation Wireless Survey?

A post-installation Wi-Fi survey is performed after a wireless network has been configured and set up. This will confirm that all wireless networking components are functioning properly and that your organization’s coverage and capacity needs are being met with your new wireless network. This extra step is where Storcom feels we set ourselves apart from […]