Last week, my blog focused on Microsoft’s push to make everything as a service a reality. One issue that reality would expose is people and companies putting much sensitive data in the cloud, for ...
Passwords are the worst. They can be cracked, forced open in attacked, guessed, reused, sold in data breaches, created with weak practices and stored poorly even when the best password managers are ...
You’ve probably noticed a requirement to enter a temporary passcode sent through email or text message after giving your password to log into one of your online ...
A talented hacker might be able to easily crack the password for your bank account – especially if it falls under the easy-to-guess formula of your first name and last initial. However, if you have ...
Remote work has become indispensable in today’s interconnected environment. Yet the convenience of working outside a centralized office also expands the potential for cyber threats. This installment ...
How secure are your online accounts? Do you use the same password for everything? Using the same password for everything is a bad idea because it makes it easier for hackers to access your accounts.
Image: Sheila Grela and AI. In today’s digital age landscape, where 27% of law firms experience security breaches, protecting sensitive client information is paramount for legal professionals. With ...
A ransomware attack was prevented just because the intended victim was using multi-factor authentication (MFA) and the attackers decided it wasn't worth the effort to attempt to bypass it. It's often ...
You did everything right and secured your account with multi-factor authentication, but now you've managed to lock yourself out. Here's how to escape this predicament. Since my start in 2008, I've ...
An error has occurred. Please try again. With a The Portland Press Herald subscription, you can gift 5 articles each month. It looks like you do not have any active ...
Today’s relentless online criminals have made it necessary to not only employ multifactor authentication in securing IT networks and apps, but to make sure that such authentication can also be ...