Feb 29, 2020 | 2FA, Best Practices, credentials, Password Managers, Passwords, Privacy, Radio Show, Radio_Show, Security, Security, Social Influencers, Technology
Passwords: Length trumps Complexity Complex passwords that must be changed every 90 days are the bain of most companies and a headache for employees and they are not as secure as you have been led to believe. The reason is that people have to write them down. They...
Jan 4, 2020 | 2FA, Attack Vectors, Audit Logs, audit logs, Business, Business Email Compromise, credential stealing, credentials, Cyber Liability, cyberattacks, Cybercrime, Cybersecurity, Elections, Elections, Email, Employees, Encryption, Hackers, Hacking, Hacking, Hacking Tools, Intellectual Property Theft, Internet, Nationstates, Patching, Radio Show, Radio_Show, Russia, safety, Security, Security Alerts, spying, Technology, Third - Party, third-world, Updates, Voting Technology
Did the Russians get Anywhere close to Hacking our 2016 Election? Like with most of the hacks, it all begins the same way, unpatched vulnerable systems, and untrained personnel. That is all it takes for an opportunistic criminal or nation-state hacker to gain...
Nov 16, 2019 | 2FA, Best Practices, Business, Computers, credentials, Cyber breaches, cyberattacks, Cybersecurity, Employees, Employees, Hacking, Hacking, hardware token, Internet, Laptops, Malware, MFA, Phishing, Radio Show, Radio_Show, Security, Security, Technology
Best Practices in Authentication Still Mostly Ignored By Businesses How do cybercriminals breach into corporate systems? They use many tactics but on of the easiest is through the use of compromised credentials. The problems is that these are real valid credentials...
Oct 19, 2019 | 2FA, Agencies, Best Practices, Biometrics, Business, credentials, Cyber breaches, Employees, Employees, Encryption, FBI, Financial, Government, Hackers, Hacking, hardware token, Internet, MFA, privacy, Radio Show, Radio_Show, Security, Security, Technology
It is People and Shortcuts Not MFA that’s the Issue and Biometrics is not the Answer There is a risk to Multi-factor authentication — but it why? Most businesses who choose to use it — decide to use the most insecure version of it. Hackers already...
Jul 6, 2019 | 2FA, Best Practices, Breaches, Business, Cloud, Internet, O365, Radio Show, Radio_Show, Security, Software Manufacturers, Technology
O365 Non-Security – again The US Cybersecurity and Infrastructure Security Agency (CISA) has become the latest government body to plead with admins to implement security best practices on Microsoft’s Office 365 platform. The UK’s National...