Monthly Archives: April 2016

Let’s Up Your Password Game

secure passwords

Between your cloud service, e-mail account, online banks, e-commerce accounts and the rest of your internet-centric life; it sometimes impossible to be continually coming up with creative and secure passwords. Perhaps this is why people still rely on simple numerical and alphabetical passwords, but we all know better, right? Well… Read more »

CyberSecurity Headlines: Safely Discarding Hard Drives

Announcements: Cyber Security Think Tank is now CyberTraining 365! We have added a new course towards Comptia’s A+ Certification on our site. Get all of the information about the certification here There are a few key ways to safely discard a solid state drive. One way to do is to… Read more »

CyberTraining 365 is a Finalist for Best Cybersecurity Education Provider Award

We are proud to announce we have been nominated as a finalist in the category Best Cybersecurity Education Provider of the Cybersecurity Excellence Awards! As we have been fervently pursuing our mission to make cybersecurity training accessible to the masses and fill the skill gap, this is a huge step… Read more »

The FDIC Framework and the 4 Components of a Successful Cyber Security Program

The FDIC Cyber Security Framework The NIST (Institute of Standards and Technology) defines cyber security as “the process of protecting information by preventing, detecting and responding to attacks.” In 2013, the President Barack Obama issued Executive Order 13636 “Improving Critical Infrastructure Cyber Security”, delegating the development of a cyber security… Read more »

CyberSecurity Headlines: What Non-Technical Professionals Need to Know

What the staff needs to know: There are two schools of thought about cybersecurity training and maintenance within a company. A very common approach is just to send reminders of previous training. This tactic is just meant to keep precaution on the forefront of employees minds, assuming they already know… Read more »

CyberSecurity Headlines: Securing Wireless Networks

The majority of devices at home and business today have wireless capabilities. There are a few options to keep your business/home wireless networks safe. PEAP and LEAP attacks are available, but pricier. Protected Extensible Authentication Protocol (PEAP), is a protocol that encapsulates the Extensible Authentication Protocol (EAP) within an encrypted… Read more »

CyberSecurity Headlines: Cracking Wireless Networks

In this video, we crack a router that speaks WEP. Wired Equivalent Privacy (WEP) is a security protocol specified in the IEEE Wireless Fidelity standard. This was the first standard developed for cybersecurity protection. Despite WEP being a bit out-dated it is not uncommon to see. However, more common encryption… Read more »