Passwords – How Did It All Start?

Passwords – How Did It All Start?

The first passwords began to be introduced in the 1960s, when computer systems began to develop, and managing access to them became more complicated. One example is the CTSS (Compatible Time-Sharing System), which was created at the Massachusetts Institute of Technology (MIT). Revolution OS Previou…
Read more →
Do You Have a Password Policy? That Doesn’t Mean Much.

Do You Have a Password Policy? That Doesn’t Mean Much.

Companies invest heavily in tools like SIEM, EDR, NDR, implement MFA, and conduct training. And rightly so. But there’s one problem... Most still don’t know how strong (or rather weak) their passwords are. The reason is simple. Nobody checks them, and security remains in a state of superposition, so…
Read more →
Proactive Security Approach - Data Breach Monitoring

Proactive Security Approach - Data Breach Monitoring

Every day, an absurd amount of new data breaches appear online. On top of that, old breaches still circulate, often easily accessible – both for free and for a fee – and they can pose a real threat to your company. Attacks using what are known as “creds” (from credentials), i.e., login:password pair…
Read more →
120 minutes that can save your company – a cybersecurity awareness training

120 minutes that can save your company – a cybersecurity awareness training

No big budget needed to significantly improve security. All it takes is two hours. Two hours that won’t change the world, but could protect your company from severe consequences. And this is not theory. This is practice, evident in every incident that could have been avoided. And there are plenty of…
Read more →