|
|
|
|
Target and Colonial Pipeline have something in common. Know what it is? Both suffered cybersecurity breaches due to poor password practices. In Target's case, hackers gained access to the company's network by stealing login credentials from a third-party vendor. This vendor had weak passwords and no multi-factor authentication enabled, making it easy for the hackers to obtain the necessary credentials.
Similarly, Colonial Pipeline's breach was also caused by weak passwords. Hackers gained access to the company's VPN using a compromised password that was no longer in use but still active. These incidents demonstrate the critical importance of strong password practices and the need for companies to implement additional security measures, such as multi-factor authentication, to protect their systems and networks.
|
|
|
Background: Authentication Factors
Authentication is a process that proves the identity of a person or system. There are three common ways to assert identity, called factors: something you know (e.g., a password or PIN), something you are (e.g., fingerprints or other biometrics), and something you have (e.g., a token application on your phone). Computer systems initially used a single factor to authenticate users, such as a username and password combination (something you know). However, over time, it became clear that people often choose convenience over good password hygiene. This was evident through the analysis of passwords leaked from breaches.
|
|
|
Multifactor Authentication: A Safety Net
Good password hygiene involves several rules: never use the same password on more than one system (e.g., social media, corporate login, bank account access); never use easily guessable passwords; and longer passwords are better than short ones. However, even with efforts to use good passwords, there are tactics attackers use to get around the best password hygiene, as evidenced by phishing. Phishing currently represents the most common form of attack. "The DFIR Report: 2022 Year in Review" report found that 70% of initial access in 2022 was attributed to phishing, and for businesses, it
|
|
often took the form of Business Email Compromise.
Multifactor Authentication (MFA), or using more than one authentication method, has been the most effective way to reduce the risk of a successful password-related attack and serves as a safety net. While MFA does not prevent account compromise 100% of the time, it goes a long way. The most common second factor used in corporate environments today is "something you have," in the form of an application such as DUO on your mobile device or an app that generates a six-digit rotating code. Because MFA introduces friction between users and the systems they are trying to access, it is important to understand the impact MFA has on preventing successful cyber-attacks. Still unsure of MFA's benefits? Here are some headlines about MFA:
- Microsoft: MFA can block over 99.9 percent of account compromise attacks.
- Google: MFA helped prevent 100% of automated bots, 99% of bulk phishing attacks, and 90% of targeted attacks.
- Infosecurity Magazine: Tech CEOs: Multi-Factor Authentication Can Prevent 90% of Attacks Conclusion
Multi-factor authentication has proven to be an effective security measure in protecting accounts from compromise, regardless of the additional factor's form. MFA's ability to add an extra layer of security through the use of multiple authentication factors significantly reduces the risk of unauthorized access to accounts. While some users may perceive MFA as an additional burden or inconvenience, the security benefits outweigh any potential inconvenience. Therefore, implementing MFA should be considered an essential security practice for both individuals and organizations looking to protect their online accounts and sensitive information from compromise. Alpha Technologies can lead you through the MFA process with an expert setup, training, and service for an unbreakable solution to enhance your security. Ready to get started? Give our sales team a call or email with the information below!
|
|
|
|
MULTIFACTOR AUTHENTICATION WITH DUO
|
|
|
Not every MFA solution is the same. Some vendors only provide the bare minimum needed to meet compliance requirements — and include lots of hidden costs required for deployment, operation and maintenance. Plus, many traditional solutions are clunky and error-prone, and require extensive user training and support.
Check out Cisco ebook to learn how to find an MFA solution that works for you and your business, and get started on the road to better data security with Alpha and Cisco.
|
|
|
|
|
|
Your password isn’t protecting you the way you think it is. Especially if someone can guess your password from looking at your social media. But let’s say you have a complex password – or a password manager even – unfortunately malicious cyber actors still have ways to get past your password. And once they’re in your accounts… you can wave bye-bye to your money, and possibly your identity. Grab CISA's recommendation below.
|
|
|
|
|
JOIN ALPHA TECHNOLOGIES FOR TWO EXCLUSIVE LUNCH & LEARN EVENTS
|
|
We are thrilled to invite you to two exciting Events hosted by Alpha Technologies!
As a valued client, we believe in empowering you with the knowledge and tools to stay ahead of the curve in today's fast-paced digital world. These exclusive events will give you a chance to uncover emerging technologies, explore incredible offers, and connect with industry professionals.
|
|
|
SECURE, AFFORDABLE, & CERTIFIED COLOCATION SERVICE DOES EXIST IN WV
|
|
Where: Alpha Technologies Data Center: West Virginia Regional Technology Park 2020 Union Carbide Drive, Building 6000 South Charleston, WV 25303.
You’re invited to an exciting event hosted by CEO Doug Tate and CTO Jack Belcher, as they share use cases, business advantages, and why colocation may just be the right answer for your business or organization. Registration includes a tour of our Data Center facility and lunch. Parking will be provided in the Data Center’s west parking lot. Contact sales for more details: 304-201-2616.
|
|
|
|
Event Registation on our website can be found here. Come learn about Alpha's Data Center and Colocation Services!
|
Get your copy of our Colocation Simplified E-book for assistance with colocation decisions and calculations!
|
|
|
IMMERSIVE VR EXPERIENCE WITH EXTREME
NETWORKS AND ALPHA
|
|
|
Where: The Legends Club Room 601 Morris St. STE 201 Charleston, WV 25301
Join us for an SD-WAN talk with SaaS expert, Kenny Peach, showcasing Extreme’s cutting-edge technology. Experience an immersive tour of a Major League Baseball stadium hosted virtually by Extreme’s CTO, David Coleman using virtual reality headsets. Plus, don’t miss out on the chance to attend a Charleston Dirty Birds game and enjoy lunch after the event. This exclusive invitation is a must-attend for anyone looking to enhance their understanding of SD-WAN and network technologies. Contact sales for more details: 304-2014-2616.
|
|
|
Event Registation on our website can be found here. Come learn about Extreme Technologies and SD-WAN!
|
Experience the VR fun for this event below and then
give your best swing against your favorite pitcher at our event!
|
|
|
|
|
|
|
|
|
|
Doug Tate
CEO
304-201-7485
|
Rich O' Brien
Executive Vice President
304-201-7485
|
James Stewart
Sales Account Executive
304-721-8987
|
|
Andrea Myers
Sales Enablement Manager
304-721-8992
|
Chris Starkey
Sales Manager
304-721-8969
|
John Lovejoy
Account Manager
304-721-8969
|
|
|
Brock Buckhannon
Inside Sales Account Executive 304-721-8632
|
|
|
|
|
|
|
|
|
Alpha Technologies by the Numbers
|
|
20+ Years Pioneering Managed Network Services
|
300+ Enterprise Customers
|
24 Countries Serviced
|
EXP STAFF 20+ Vendor Certifications
|
95% Customer Retention Rate
|
|
24/7
NOC
|
80,000 Square Foot "World Class" Data Center
|
94% Resolution World Class Service Desk
|
3 Major Compliance Certifications HIPAA/SOC/PCI
|
|
|
Alpha Technologies
4003 Outlook Dr,
Hurricane, WV 25526
Email: marketing@alpha-tech.us
Contact: 304-201-7485 Opt 2
We sent this message to all existing Alpha Technologies customers. If you no longer with to receive these emails, please use the unsubscribe button.
|
Alpha Technologies
|
Legal
|
|
@2023 Alpha Technologies. All Rights Reserved
|
|
|