It’s been an incredible 2018 for DFI Forensics Inc. and Tyler Hatch. From inception to momentum. From vision to realization. From a dream to reality. We are going to come out strong in 2019 and wish all our clients and supporters a happy year filled with happiness, health and continued success.
Cybersecurity awareness and secure configuration of compromised (“hacked”) computers, smartphones and online/cloud accounts;
Open source intelligence investigations for pre-employment screening (osintemployeebackgroundchecks.com); and
We have rapidly established a reputation for expert-level digital forensics, incredible value and an amazing client experience. A brief review of our five-star Google Reviews will tell you what you need to know about how much we care about the needs of our clients.
If you require the services we offer, simply call/text (604)880-1418 or email firstname.lastname@example.org for more information. Alternatively, submit an online inquiry through our website by filling out the form here.
We will give you honest, expert advice and provide you with a written proposal and quote prior to commencing any work for you. Our quotes matter because DFI clients never pay more they are quoted up front. We believe you want certainty in terms of cost of engaging us so that is what we provide.
We look forward to serving you in 2019 and for many years ahead!
The risk of a cyberattack or data breach has never been higher nor has the potential damage to your business ever been greater.
DFI Forensics Inc. specializes in advanced digital forensics services for businesses that have suffered a cyberattack, IT network intrusion or data breach in the greater Vancouver area of British Columbia, Canada.
Organizations must establish a standard for the creation, maintenance, and storage of strong passwords. There are currently two approaches an organization should review when implementing a password policy. The first is to follow all guidelines provided by the National Institute of Standards and Technology’s (NIST) password recommendations, as listed in Special Publication (SP) 800-63B, Section 22.214.171.124. If an organization is unable to follow NIST SP800-63B due to budgetary or technological constraints, it is recommended that the following be used while working towards the NIST standard.
Implement complexity rules that:
Allow for a minimum password length of 14 characters.
Force passwords to contain uppercase and lowercase letters, numbers 0 through 9, and non-alphanumeric characters.
Do not allow repetitive or sequential characters (e.g. ‘aaaaaa’, ‘abc123’).
Do not allow context-specific words, including usernames and their derivatives.
To calculate the entropy (strength) of a password, the character set is raised to the power of the password length. There are 26 uppercase, 26 lowercase, 10 digit, and 33 ASCII-printable symbols available on the average keyboard. A computer can guess over 1 billion passwords per second.