Cyber Security
Threat Specific Prevention Tools
SERVICE: HYPR Zero
SKILL LEVEL: Advanced
OWNER: HYPR True Passwordless(™) MFA platform
DESCRIPTION:
HYPR Zero is designed for smaller organizations and delivers passwordless multi-factor authentication.
LINK: True Passwordless MFA for Small Business Pricing | HYPR
SERVICE: Authentication Tool
SKILL LEVEL: Advanced
OWNER: Trusona
DESCRIPTION:
A passwordless authentication for WordPress admins that enhances security & usability.
LINK: Trusona for WordPress – WordPress plugin | WordPress.org
SERVICE: Microsoft Security Compliance Toolkit 1.0
SKILL LEVEL: Basic
OWNER: Microsoft
DESCRIPTION:
This toolset allows enterprise security administrators to download, analyze, test, edit and store Microsoft-recommended security configuration baselines for Windows and other Microsoft products, while comparing them against other security configurations.
LINK: Download Microsoft Security Compliance Toolkit 1.0 from Official Microsoft Download Center
SERVICE: Trusona 2-Step Verification with TOTP
SKILL LEVEL: Basic
OWNER: Trusona
DESCRIPTION:
This free mobile app can be used with any 3rd party service that offers 2-step verification with a 6-digit TOTP code. App users will need to input its their username and password for the 3rd party service they would like to access.
LINK: Trusona 2-Step Verification with TOTP | Trusona Docs
SERVICE: John the Ripper Password Cracker
SKILL LEVEL: Basic
OWNER: OpenWall
DESCRIPTION:
This offering is a password security auditing and password recovery tool available for many operating systems. John the Ripper jumbo supports hundreds of hash and cipher types, including for: user passwords of Unix flavors, macOS, Windows, groupware, and database servers; network traffic captures; encrypted private keys, filesystems and disks, archives, and document files.
LINK: John the Ripper password cracker (openwall.com)
Cyber Security Cafe
Cyber Security Cafe is a private public service and offers no goods or services other than posting the current cyber threats we are facing and what we can do to prevent us from being affected and if we are, what we can do to correct the problems and to avoid intrusions in the future.
- Prevention often means not accepting the 'easy' ways.
- Most of Modern Technology exists in order to obtain your personal data.
Current Threats
Current Treats so you the latest and often most dangerous cyber threats. They indicate where they orininated from, and what areas they are targeting. By knowing in advance you can take precautionary actions now, before it's too late.
Cyber Solutions
Are a group of tools and information that is designed to keep you up to date and to give you the tools to protect both your network and equipment. Most of the tools are available 'free of charge' too and are provided by safe governmental agencies.