
Risks Associated with Ghost/Inactive Accounts
Ghost accounts, depending on context, have various definitions. A Ghost Account can be: A social media account made solely to view other people’s content An inactive account that is still live but has either been forgotten about or is seldom used. Ghost Social Media Accounts People make ghost accounts on social media platforms for a… Continue Reading →

Digital Identities
When you are walking about town, or on the Internet, how do you identity that you are you and not some imposter? Current Forms of ID We should all carry some form of physical identification (e.g. a photo driving licence) that can prove who we are, our age and where we live. In the UK… Continue Reading →

Account and Password Management
We all have many logins for websites and online services. Managing these logins is a problem, especially when we need to maintain unique passwords for each as well as multi-factor authentication. There are many programmes out there that are trying to make us do without passwords, but I do not believe that passwords will be… Continue Reading →

Securing your Online Accounts
We all have hundreds of online accounts that we have accumulated over several years on online activity. I know I have as I have just gone through all of them to ensure they are not vulnerable to any form of cyber attack. What kind of Cyber Attacks are we talking about here? There are many,… Continue Reading →

Credential Stuffing Attacks
We have written about Credential Stuffing Attacks previously, so this is largely an update for that blog post with some additional information and research that has just come to our attention. Firstly, lets define what this means. A Credential Stuffing Attack is where a cyber attacker will attempt to gain access to a computer system… Continue Reading →

Bot Based Credential Stuffing
Firstly let me explain what Credential Stuffing is all about. You will have heard of a large number of data breaches in the press where millions of user names and passwords are disclosed during the hack and posted on the dark web. Often you find people re-use passwords across various websites and services. So, if… Continue Reading →

Guidance on Effective Use of Passwords
Updated 4 February 2019 and 9 March 2019. I want to talk to you about authentication in general, and how important it is to ensure your online identity is secure. Passwords are going nowhere fast! Every time you login to a new device, be it a smartphone, tablet or some form of PC, you nearly… Continue Reading →
Headline photo provided by Shutterstock.