Browsed by
Author: nate-sorrentino

Nate is a Marketing Manager at STEALTHbits and has worked in the IT Security industry for  5 years.
Are Weak Passwords Putting You At Risk?

Are Weak Passwords Putting You At Risk?

Credentials and data: two common denominators that are present in almost every breach scenario. Unfortunately for all of us, attackers are well aware that you can’t have one without the other. Getting to the mother lode is simple, really. Step 1: Crack the password. Step 2: Obtain credentials. And that’s why an organization’s password requirements and policies should always be under intense scrutiny. But herein lies a problem. What if an organization has “complex” criteria in place, but the output…

Read More Read More

EU GDPR: Paving the Way for New Privacy Laws?

EU GDPR: Paving the Way for New Privacy Laws?

The May 25th EU GDPR deadline might have been less than 2 months ago, but it’s clear that the ripples from the groundbreaking act have already begun to make their way “across the pond” into the United States. This was evident just last month when The Golden State unveiled their “California Consumer Privacy Act” which sets restrictions on how organizations harvest and use data, and perhaps kicking off the beginning of the aptly named “Privacy Movement.” In what could end up…

Read More Read More

Amazon Echoes, Fitbits, and Fuzzy Handcuffs – Another Reflection on the Internet of Things

Amazon Echoes, Fitbits, and Fuzzy Handcuffs – Another Reflection on the Internet of Things

I’m Going to Start This Blog out With a Story The other weekend my roommate and I had some company over to our apartment. It was like any other Friday night – friends chatting, music playing, and a few adult beverages being passed around. However, as we were leaving to go out to the bars, one of our guests decided it would be hilariously funny to play a little prank. Unbeknownst to me, he used the voice ordering feature on…

Read More Read More

5 Cybersecurity Trends for 2017

5 Cybersecurity Trends for 2017

It’s December, the holidays are upon us, and it’s that time of the year for the proverbial “2017 predictions” blog. Not to be left out of all the fun, we went around to a few of our resident industry experts here at STEALTHbits to get their opinions of what trends will emerge in the New Year within the world of cybersecurity. Check out what they had to say: Trend #1 – Create a Cybersecurity Talent Brand “Let’s face it –…

Read More Read More

5 Steps for Cleaning up Active Directory

5 Steps for Cleaning up Active Directory

Brad Bussie presented a great webinar a couple weeks ago and laid out a simple, straightforward 5-step plan for  Active Directory (AD) Clean-up.  We’ve gotten so much positive feedback on his webinar, that I thought I summarize some of the key takeaways for those of you who weren’t able to attend.  (You can also listen to an on-demand replay of the webinar here.) For many organizations, Active Directory (AD) is the main hub for all authentications and authorizations to an…

Read More Read More

Has My Information Been Compromised? Probably!

Has My Information Been Compromised? Probably!

It’s your worst fears come true. You try to log onto your LinkedIn account. Maybe it’s Tumblr or even your Dropbox profile. Perhaps you’ve been thawed out after being cryogenically frozen for the last 10 years and attempt to access a new, Tom-less Myspace. But all of them return an error. Your password has been changed. Spam messages start flowing from your hijacked account, flooding your news feed with offers for certain ‘enhancement’ pills. What other information did you have…

Read More Read More

Political Hacks (The Cyber Kind): Colin Powell and the DNC

Political Hacks (The Cyber Kind): Colin Powell and the DNC

In politics, information is power. Just one small comment or suggestion from a candidate or figure held in high esteem can potentially sway entire elections. Politicians also hold access to a treasure trove of sensitive information, not intended for the masses. That’s why Hillary Clinton’s private server fiasco is such a big deal in the eyes of many. But with the leaks of the Democratic National Committee (DNC) emails, and more recently, the hack of Colin Powell’s account, can we really…

Read More Read More

Delta Airlines, Stuxnet, and the Internet of Things

Delta Airlines, Stuxnet, and the Internet of Things

We live in a very connected world, and it’s only becoming more connected. Every day I see more and more commercials etching us further toward the “home of the future.” Not long ago would it have been unthinkable to see commercials for a Wi-fi enabled refrigerator complete with a massive touch screen (presented by America’s favorite celebrity couple) or a thermostat controlled by your phone. Now, not a day goes by that I don’t see Alec Baldwin pitching an Amazon…

Read More Read More

Hacking America’s Pastime

Hacking America’s Pastime

All it took was one recycled password. If you haven’t heard the news yet, former executive for the St. Louis Cardinals baseball team Christopher Correa has officially been sentenced to 46 months in prison for hacking. This victim in this case? (Former) Rival team the Houston Astros and their internal database/communications hub aptly named “Ground Control.” So how does something like this happen? Baseball is supposed to be a game of integrity and sportsmanship! Well, it’s important to remember that America’s…

Read More Read More

Higher Education, Higher Risk

Higher Education, Higher Risk

Higher education is tough, and not just for the people attending and sleeping through early morning classes. Most people do not and never will know about the underlying challenges institutions must tackle in the face of compliance. On top of having to deal with thousands of young, rowdy, and generally inebriated students on a daily basis, they also must comply with the many government standards that are put before them, or be forced take the brunt of costly monetary penalties…

Read More Read More

Start a Free StealthAUDIT® Trial!

No risk. No obligation.