Frequently Asked Questions

Frequently Asked Questions

We’ve compiled answers to some of our most frequently asked questions and are sharing them here. We hope you find them helpful. If you have a concern that isn’t included in the list below, please feel free to Contact Us with your question.

What are the Fundamental Principals of security?
  • Availability – The timeliness and reliability of data delivery to authorized users.
  • Confidentiality – Ensuring the privacy of data and that only authorized users have access.
  • Integrity – The accuracy and reliability of the data itself.
What is Social Engineering?

When one individual coerces confidential information from another user utilizing nefarious and misleading methods.

What is a Vulnerability?

Any weakness or avenue that can be exploited to compromise availability, confidentiality, or integrity of information.

What is a Threat?

Anything that can compromise the availability, confidentiality, or integrity of information.

What is a Risk?

The risk is the consequence of exploitation factored by the likelihood that a particular vulnerability will be exploited by a threat.

What is a Countermeasure or Safeguard?

A control put into place to mitigate a potential risk.

What Makes a Good Password Policy?
  • The password is simple yet effective. The user should never have to revert to writing it down.
  • A minimum of 8 characters utilizing a mixture of upper & lower case, numbers and special characters. A good policy requires at least 1 from each category.
  • No dictionary words
  • Users are not allowed to repeat passwords for 8+ cycles.
  • Changed at a maximum of every 90 days
  • Changed at a minimum of 1-2 days
  • There is such a thing as “Too much of a good thing”, when it comes to password policy.