Phishing emails were the first stage of some of the biggest hacks and data leaks of the last few years and groups behind such attacks are continuing to evolve new strategies.
Read MoreOne of the best things about having a solid password is that you don’t have to change it. If it’s strong, unique, and hasn’t been compromised by an attacker, you gain no security benefits by modifying it according to some arbitrary timetable. Just let it be.
Read MorePasswords are a problem. Every account should have a unique password that’s hard to guess. But how do you remember all those unique passwords when you have a lot of accounts?
Read MoreMicrosoft Authenticator is a security app for two-factor authentication. You log into an account and the account asks for a code. This app generates those types of codes. It’s extremely useful for quick sign-ins, it works cross-platform, and it’s faster than email or text codes.
Read MoreEducation is key here. Training and awareness.
Read MoreWith half a billion dollars lost to phishing every year, it is worthwhile to keep up with new methods that hackers use to trick employees into giving out their credentials and other sensitive information.
Read MoreIf you have been online for any length of time, chances are that your account details from a service have been compromised and leaked online.
Among the sites listed on Have I Been Pwned? are data breaches or leaks from websites.
Read MoreEvery day, often multiple times a day, you are invited to click on links sent to you by brands, politicians, friends and strangers.
Read More