November 2024 S M T W T F S 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 Blog Stats
- 75,639 hits
Search Results for: 2 factor
JP Morgan Follow Up: 2 Factor Authentication Fail
Back in October, I wrote about JP Morgan getting breached, and 76 million households and 7 million small businesses were affected. (83 Million in total) Most big banks use two-factor authentication, which requires a second one-time password to gain access … Continue reading
Posted in Security Blog
Tagged 2014, breach, Chase, computer security, JPMorgan, two-factor
Comments Off on JP Morgan Follow Up: 2 Factor Authentication Fail
2 Factors of Authentication
A little hassle with logging into a system is tremendously worth the amount of security, if that system has information worth securing. I’ve enabled two-factor authentication for services I use. Some services call it two-step authentication, which is a sub-category … Continue reading
Posted in Security Blog
Tagged 2014, passwords, two-factor
Comments Off on 2 Factors of Authentication
2-Factor on LinkedIn
If you use LinkedIn, like I do. Enable 2-factor authentication to keep your professional profile and contacts secured. How embarrassing would it be if you are advertising yourself as a security and privacy professional and someone gets into your account … Continue reading
Posted in Security Blog
Tagged 2014, authentication, Information Technology Security Awareness, linkedin, NCSAM, phishing, reputational security, social engineering, two-factor, video tutorial
Comments Off on 2-Factor on LinkedIn
PCI SSC 2016 North America Community Meeting: Day 2
Yesterday was Day 2 of the conference and I had a full agenda. Here are some pictures (mostly of slides…)
Posted in Security Blog
Tagged #PCICM, 10th Anniversary of PCI SSC, PCI DSS, PCI SSC
Comments Off on PCI SSC 2016 North America Community Meeting: Day 2
PCI DSS Version 3.2
PCI DSS 3.2 is officially published Here is the summary: Multi-factor authentication will be required for all administrative access into the cardholder data environment. The “Designated Entities Supplemental Validation” (DESV) – a set of steps that tell an entity how they can … Continue reading
RSA Conference 2016
This week, I’m at the Moscone center in San Francisco, learning from those who have learned the lessons through trials and tribulations and have experienced them in such a way that they have put them into practice, have gained passion … Continue reading
Posted in Security Blog
Tagged factor analysis information risk, fair, Jack Jones, risk analysis, rsa, RSA Conference
Comments Off on RSA Conference 2016
Worst Passwords of 2015
2015’s most used cracked passwords ranked by popularity… Yes, people still use bad passwords, despite the warnings to have some complexity. Perhaps we should code systems to reject simple passwords? 1. 123456 (UNCHANGED) 2. PASSWORD (UNCHANGED) 3. 12345678 (UP 1) … Continue reading
Posted in Security Blog
Tagged 2 factor, 2-step, 2015, 2016, authentication, password, passwords, two-factor
Comments Off on Worst Passwords of 2015
Happy Two-Factor Tuesday!!!
Check out some of my awesome posts on enabling Two-Factor What is Two-Factor? It’s something you know… like a password… and something you have, like an token generator or smartphone! That doesn’t mean have an easy to guess password though! You … Continue reading
Posted in Security Blog
Tagged 2015, cyber risk, NCSAM, passwords, risk, security, Security Awareness, two-factor
Comments Off on Happy Two-Factor Tuesday!!!
Factoring attack on RSA-EXPORT Keys (FREAK)
Researchers disclosed a new SSL/TLS vulnerability — the FREAK attack. The vulnerability allows attackers to intercept HTTPS connections between vulnerable clients and servers and force them to use ‘export-grade’ cryptography, which can then be decrypted or altered. The ssl3_get_key_exchange function … Continue reading
Posted in Security Blog
Tagged 2015, Apple iPhone, FREAK, Google Android, man-in-the-middle, mitm, openssl, rsa, ssl, tls, vulnerability
Comments Off on Factoring attack on RSA-EXPORT Keys (FREAK)
Worst Passwords of 2014
An analysis of the most leaked passwords that were posted online throughout 2014, out of the 3.3 million passwords leaked online, the most common, Top 15 were: 123456 password 12345 12345678 qwerty 1234567890 1234 baseball dragon football 1234567 monkey letmein … Continue reading
Posted in Security Blog
Tagged 2014, 2015, authentication, Information Technology Security Awareness, passwords, reputational security, two-factor
Comments Off on Worst Passwords of 2014