Skip to content
Awareity
Awareity

The Pre-Incident Prevention Experts

Primary Navigation Menu
Menu
  • Home
  • About
    • About
    • Awareity Butterfly Effect
    • Contact
    • Support
  • Solutions
    • Information Security Training
      • Information Security Awareness Training
      • Awareness and Accountability Vault (AAV)
    • Prevention and Connecting the Dots Platform
    • First Preventers Framework
    • Prevention and GAP Assessment
    • Threat Assessment Teams
    • Climate Surveys
    • Partners in Prevention
    • Industries
      • K12
      • Higher Education
      • Diocese
      • Healthcare
      • Government
      • Corporate
  • Blog
  • Info Request

Password Security

Would you rather manage Lessons Learned or manage Data Breaches?

2009-07-15
By: Awareity
On: July 15, 2009
In: *Connecting the Dots Blog*, Information Security

As People continue to accumulate numerous passwords for their online social networking sites, personal e-mail and online banking, most People seem to have no problem logging in with different passwords for different applications to protect THEIR PERSONAL information. So we know People can handle passwords!  The key then for Managers (including IT Managers) is to help People (boards, employees, vendors, contractors, partners, etc.) understand the importance of THEIR ORGANIZATION’s information. However, a recent survey by Credant Technologies revealed that 35% of IT Security professionals do not use a password on their business phones or smartphones, even though they contain sensitive and confidential information!  Information mayRead More →

Kansas Audit Reveals Questions and Lack of Implementation

2009-07-14
By: Awareity
On: July 14, 2009
In: *Connecting the Dots Blog*, Information Security, Legal

A new Computer Security Audit Report was released by Legislative Division of Post Audit State of Kansas in July 2009 providing an overview of computer and network security for five state agencies.  The audit found weak password controls and missing security patches for servers and 39 percent of one unnamed agency’s passwords were cracked within five minutes using free software that can be easily downloaded from the Internet. To breach an agency’s passwords, hackers scan vulnerable servers that may not have the latest security patches applied and then locate an encrypted list of passwords they can copy and use password cracking software to reveal users’Read More →

READ MORE:

WATCH MORE:

Not seeing the form to request information? Drop us a line and we’ll send you more information!

Recent Blog Posts

Higher Ed Research facts, silos, and different actions

April 10, 2025

Community Research facts, silos, and different actions

April 10, 2025

K12 Research facts, silos, and different actions

April 3, 2025

Bias-based Decisions Can Be Overcome

December 4, 2024

First Preventers Believe…

October 18, 2024

Rick Shaw, Founder & CEO

Click here to learn more about Founder, CEO, and Prevention Specialist, Rick Shaw.

Awareity on Twitter

Tweets by Awareity

Search

Tweets by Awareity

Support

Need more information on
Support for AAV or TIPS?

Click here

What are you looking for?

Connect the Dots With Us!

 | |

Designed using Dispatch Premium. Powered by WordPress.

This site uses cookies to ensure that we give you the best experience on our website. Continuing to use this site means you are agreeing to the use of cookies.Ok