One Small Sticky Note on a Password Wall, One Giant Leap for Security

If you’re writing down your passwords on adhesive notes or in a journal, you might need a refresher on password security best practices.

The post One Small Sticky Note on a Password Wall, One Giant Leap for Security appeared first on Security Intelligence.

Continue reading One Small Sticky Note on a Password Wall, One Giant Leap for Security

One Small Sticky Note on a Password Wall, One Giant Leap for Security

If you’re writing down your passwords on adhesive notes or in a journal, you might need a refresher on password security best practices.

The post One Small Sticky Note on a Password Wall, One Giant Leap for Security appeared first on Security Intelligence.

Continue reading One Small Sticky Note on a Password Wall, One Giant Leap for Security

Creating and using a strong individual password for every online account.

Creating a strong password for every website that you use is the essential first step in secure online behaviour. This advice from UK Gov’t is at first glance very good advice. But it implies that you only need different secure passwords for a few important online accounts, Your email, your bank … Continue reading → Continue reading Creating and using a strong individual password for every online account.

Trust, but Verify: Authentication Without Validation Is Naïve

Fraudsters have rendered traditional authentication factors — something you know, something you have and something you are — ineffective.

The post Trust, but Verify: Authentication Without Validation Is Naïve appeared first on Security Intelligence.

Continue reading Trust, but Verify: Authentication Without Validation Is Naïve

Google will provide free cybersecurity tools for election organizers in Europe

As the threat of cyberattacks looms over Europe in the months preceding several crucial elections, Alphabet subsidiary companies Jigsaw and Google announced Tuesday the launch of a security tool package to help election organizers and civic groups ward off hackers and other forms of digital interference. The announcement comes one day after FBI Director James Comey told lawmakers that he fully expects Russian intelligence services to continue interfering in the U.S. electoral process because of their apparent success in 2016. Known as “Protect Your Election,” the Google-Jigsaw cybersecurity software package is designed for use by a nontechnical audience and it will be provided for free to groups in France, South Korea, Germany and counties with subsequent elections, according to Jigsaw, the corporation’s tech incubator. Among other capabilities, the toolset provides technology to help stop distributed denial of service, or DDoS, attacks, spot phishing emails and better protect passwords. DDoS-style attacks work by […]

The post Google will provide free cybersecurity tools for election organizers in Europe appeared first on Cyberscoop.

Continue reading Google will provide free cybersecurity tools for election organizers in Europe

It’s Time for Users to Pony Up and Quit Reusing Passwords

By reusing passwords across multiple services, users make it easier for cybercriminals to breach all their accounts, not to mention company databases.

The post It’s Time for Users to Pony Up and Quit Reusing Passwords appeared first on Security Intelligence.

Continue reading It’s Time for Users to Pony Up and Quit Reusing Passwords

Two-Factor Authentication: A Little Goes a Long Way

Online services are understandably reluctant to add steps to the login process, but a little two-factor authentication can significantly boost security.

The post Two-Factor Authentication: A Little Goes a Long Way appeared first on Security Intelligence.

Continue reading Two-Factor Authentication: A Little Goes a Long Way

Too Many Passwords: Is the End in Sight?

Will passwords become things of the past in 2017? Today, organizations tasked with managing too many passwords are at risk of phishing and malware attacks.

The post Too Many Passwords: Is the End in Sight? appeared first on Security Intelligence.

Continue reading Too Many Passwords: Is the End in Sight?

new malware delivery method fast spreading probably Locky with office rtf files with individual passwords

Heads up everybody, we have a major change this morning in what I assume is a Locky or Dridex delivery system. The files come as RTF files but each rtf file has an individual password. None of the online automatic … Continue reading →

Source

Continue reading new malware delivery method fast spreading probably Locky with office rtf files with individual passwords

Dangle Carrots in Front of Users to Correct Their Terrible Password Hygiene

Rewarding users for strong password selection can be a good way to eliminate terrible password hygiene throughout an organization.

The post Dangle Carrots in Front of Users to Correct Their Terrible Password Hygiene appeared first on Security Intelligence.

Continue reading Dangle Carrots in Front of Users to Correct Their Terrible Password Hygiene