Jul 7, 2024 | Authentication, Hacks
Today, we’re diving into a topic that’s as hot as a summer barbecue in Texas—the rockyou21 password leak. Yep, you heard that right: a whopping 8.4 billion passwords have been exposed. 😱 Grab your coffee, and let’s unpack what this massive breach...
Oct 22, 2023 | Multi-factor
Protecting systems and data has become increasingly important in today’s digital age. With cybercrime on the rise, it is crucial to have robust authentication methods in place to control access to sensitive information. We’ll explore the top authentication...
Feb 23, 2023 | Authentication, Best Practices, Business, credentials, Credentials, Cyber Security, Cybersecurity, Hacking, ID Theft, Microsoft, Microsoft, Password Managers, Passwords, Passwords, Privacy, Security, Security, stolen identity, Technology, Threats, Windows (Microsoft)
Locking down your files with a strong password is like putting a virtual lock on your front door. It helps protect your personal or sensitive information from prying eyes, cyber-attacks, or theft. Whether you’re sharing your computer with others or working in a...
Feb 19, 2021 | Access Controls, Apple, Applications, Apps, Artificial Intelligence, Attack Vectors, Authentication, Big Tech, Bitcoin, Breaches, Business, Credentials, Cryptocurrency, Cryptocurrency, Cryptomining, Cyber breaches, cyberattacks, Cybercrime, Cybersecurity, Employees, Financial, Firewalls, Google, Google, Google Play Store, Government, Hackers, Hacking, Human Element, Infrastructure, Internet, Legacy Systems, Malware, Malware, Microsoft, Microsoft, Monitoring, NASA, Networking, News, Patches, Podcast, President Joe Biden, Radio Show, Radio_Show, Regulatory Frameworks, Security, Security Alerts, Show Notes, Software, Technology, Technology, trojans, updates and patches, Utilities, Vulnerabilities, Windows (Microsoft), Zero Trust
Read. Learn. Share Tech Talk Show Notes February 20. 2021 Breached water plant employees used the same TeamViewer password and no firewall The Florida water treatment facility whose computer system experienced a potentially hazardous computer breach last week used an...
Apr 28, 2020 | Authentication, Business, Features, iHeart, Internet, Multi-factor, Security, Technology
Multi-factor Authentication Hi. Craig Peterson here with a blink into multi-factor authentication. Two-factor authentication, also known as multi-factor authentication, provides some of the highest levels of security available — Something you know along with...