Browsed by
Author: Nathan Sorrentino

Nate is a Marketing Manager at STEALTHbits and has worked in the IT Security industry for  6 years.
What is a Data Breach and How to Prevent One

What is a Data Breach and How to Prevent One

Data breach. There are fewer times that two simple words invoke so many fearful thoughts in the mind of a C-level executive. How did it happen? What was taken? What are we going to do? Who was responsible? There are many routes an organization may explore in terms of breach mitigation, but let us start at the beginning. This blog will cover some of the simple basics of a data breach – what it is, ways they are caused, etc….

Read More Read More

What is the Principle of Least Privilege (POLP)? – Definition and Best Practices

What is the Principle of Least Privilege (POLP)? – Definition and Best Practices

As part of a sound security structure, one of the most basic things a company can do is implement a principle of least privilege model within their organization. This blog will explain what this means and how this security model can up your security stature. Principle of Least Privilege Definition (POLP) The principle of least privilege stems from the idea that users should only have access to the resources that they need so they can adequately perform the duties that…

Read More Read More

What are Browser Cookies and How do They Work?

What are Browser Cookies and How do They Work?

If you have ever surfed the web, you have almost certainly encountered browser cookies among your digital travels. Although for some they may be a nuisance, for the majority browser cookies are an essential part of the internet experience, often interacting with you without your knowledge. In this blog, I will take you through a 101 primer on browser cookies. For a more in-depth look at how they may affect the security of your IT environment, I invite you to…

Read More Read More

Cybersecurity Predictions for 2020

Cybersecurity Predictions for 2020

It’s that time of the year again! As we roll into 2020 we’re proud to present our 4th edition of “STEALTHbits’ Experts Cybersecurity Predictions.” We asked eight of our top industry voices here at STEALTHbits their thoughts on what’s to come in the world of cybersecurity in the next 365 days! Read on and come back at the start of 2021 to see how we did. Ransomware Will Continue To Wreak Havoc Using the Same Old Tricks Ransomware attacks will…

Read More Read More

Are Weak Passwords Putting You At Risk?

Are Weak Passwords Putting You At Risk?

Credentials and data: two common denominators that are present in almost every breach scenario. Unfortunately for all of us, attackers are well aware that you can’t have one without the other. Getting to the mother lode is simple, really. Step 1: Crack the password. Step 2: Obtain credentials. And that’s why an organization’s password requirements and policies should always be under intense scrutiny. But herein lies a problem. What if an organization has “complex” criteria in place, but the output…

Read More Read More

EU GDPR: Paving the Way for New Privacy Laws?

EU GDPR: Paving the Way for New Privacy Laws?

The May 25th EU GDPR deadline might have been less than 2 months ago, but it’s clear that the ripples from the groundbreaking act have already begun to make their way “across the pond” into the United States. This was evident just last month when The Golden State unveiled their “California Consumer Privacy Act” which sets restrictions on how organizations harvest and use data, and perhaps kicking off the beginning of the aptly named “Privacy Movement.” In what could end up…

Read More Read More

Amazon Echoes, Fitbits, and Fuzzy Handcuffs – Another Reflection on the Internet of Things

Amazon Echoes, Fitbits, and Fuzzy Handcuffs – Another Reflection on the Internet of Things

I’m Going to Start This Blog out With a Story The other weekend my roommate and I had some company over to our apartment. It was like any other Friday night – friends chatting, music playing, and a few adult beverages being passed around. However, as we were leaving to go out to the bars, one of our guests decided it would be hilariously funny to play a little prank. Unbeknownst to me, he used the voice ordering feature on…

Read More Read More

5 Cybersecurity Trends for 2017

5 Cybersecurity Trends for 2017

It’s December, the holidays are upon us, and it’s that time of the year for the proverbial “2017 predictions” blog. Not to be left out of all the fun, we went around to a few of our resident industry experts here at STEALTHbits to get their opinions of what trends will emerge in the New Year within the world of cybersecurity. Check out what they had to say: Trend #1 – Create a Cybersecurity Talent Brand “Let’s face it –…

Read More Read More

5 Steps for Cleaning up Active Directory

5 Steps for Cleaning up Active Directory

For many organizations, Active Directory (AD) is the main hub for all authentications and authorizations to an organization’s IT infrastructure. The problem is, it’s become difficult to manage due to many reasons. For example, a migrated directory is inherited from another technology managed by a large number of people with no defined process for day-to-day operations. Unfortunately for those involved in managing AD, cleaning up Active Directory may sound like a novel idea, but the potential to introduce unknown problems…

Read More Read More

Has My Information Been Compromised? Probably!

Has My Information Been Compromised? Probably!

It’s your worst fears come true. You try to log onto your LinkedIn account. Maybe it’s Tumblr or even your Dropbox profile. Perhaps you’ve been thawed out after being cryogenically frozen for the last 10 years and attempt to access a new, Tom-less Myspace. But all of them return an error. Your password has been changed. Spam messages start flowing from your hijacked account, flooding your news feed with offers for certain ‘enhancement’ pills. What other information did you have…

Read More Read More

Start a Free Stealthbits Trial!

No risk. No obligation.