FAQ Category: Network Security and Data Protection Solutions

How Can I Protect My Company Against Rogue Access Points?

It is important to check your Wi-Fi network frequently to see if any unapproved access points have been added to the system.  Companies should keep a list of approved access points in a managed access point list, and should check if they are connected to the secure network. If necessary, Storcom can help add wireless […]

What are Popular Passwords and Why Shouldn’t I Use Them?

Passwords are typically chosen by employees, and there is a lot of room for error in this since humans believe that passwords must be easily remembered. People tend to choose passwords based on information about themselves or their lives, and such passwords are more popular because they’re easier to remember than a string of nonsensical […]

Why is a Rogue Access Point On My Company’s Wi-Fi Network?

In this day and age, network security should be of the utmost importance. This is why rogue access points should be identified and dealt with accordingly. A rogue access point is a wireless access point that has been added and installed on a secure network without the network administrator’s explicit consent. A well-meaning employee very […]

What is Social Engineering?

Although it sounds somewhat ridiculous, hackers are extremely adept at exploiting the good and trusting nature of other human beings in order to con someone into giving them their passwords. This technique is defined by the term “social engineering.” The most common way of utilizing this technique is when a hacker simply asks for a […]

What is Authentication Bypass?

Authentication bypass is when someone is able to access a system or application without being authenticated. Since the whole foundation of authentication is based upon making sure that authorized users are the only ones accessing an application or a system, it is paramount that the system or app has authentication status of a user.  If […]

What is Weak Authentication?

Authentication is the process of having to prove your identity to an application or system in order to demonstrate that you are who you say you are. Weak Authentication describes when in the strength of the authentication mechanism is relatively weak in comparison to the value of the assets that are being protected. It also describes […]

What are Brute Force Attacks?

Brute Force is the act of simply guessing a password using information that you already know about the user. This includes information like birthdays, phone numbers, pet’s name, and the names of your loved ones. Although it might seem far fetched, hackers often figure out their victim’s password simply by guessing it. This method is […]

What are the Techniques of Shoulder Surfing?

In order to be successful, the hacker needs to be in close proximity to their victims and not look like they are obviously looking at you. This method is very low risk for hackers, since all they have to do is look at your keyboard or screen when you are typing your password into your […]

What is Shoulder Surfing?

“Shoulder surfing” is the act of a hacker looking over your shoulder in order to see what another person is typing. This is a free, low-tech and effective way for hackers to gain access to your password.

What are Dictionary Attacks?

Dictionary attacks are in addition to brute force attacks. These include password cracking tools that have the ability to test a catalogue of passwords. This is known as a dictionary attack, since the file that is used may actually be a catalogue of dictionary words. Passwords with dictionary words are considered weak since they can […]