LastPass Finds Engineer’s Home PC the Cause of Recent Breach | Sync Up
New details have emerged regarding LastPass’ recent data breaches. Here’s how hackers were able to access one of the most secure platforms on the web.
Read MoreTechnology Resolutions to Consider for the New Year
One in four people start the year with a set of hopeful resolutions. For those individuals with a goal to improve the health of their organizations, here’s how technology can help you put your best foot forward in 2022.
Read MoreInstagram’s Recent Breach: How to Protect Your Data
When developing a relationship with another individual, it’s fair to say that some time is needed before you begin to share private information with the other party. That said, many social media sites expect a user to completely forgo this exploratory process, taking it upon good faith that the developers of the site have created an environment in which this information can be shared securely. Unfortunately, this is not always the case; and with information on expansive data breaches continuing to surface, users may quickly discover that their perceived trust with these organizations is easily violated.
Read MorePassword Security: Part Three – Two-Factor Authentication
Over the past few weeks, we’ve covered everything from password complexity to the management that sustains it. Now, we’re ready to make the leap into a slightly more complex layer of password security, two-factor authentication. In this final installment, we’ll wrap things up by highlighting the benefits of implementing one of these services, while helping you decide which method may be right for you.
Read MorePassword Security: Part Two – Managing Multiple Passwords
If you read the first part of our password security series, you understand the significant impact that passphrases can have on account security. This week, we’re focusing our attention on the importance of using multiple unique passphrases, while giving you some handy methods to keep track of all your new login credentials.
With just a couple of (free) changes, you can add an additional layer of security to all of your online accounts.
Read MorePassword Security: Part One – Implementing a Passphrase Standard
While protecting an organization’s network from the threat of hackers is a complex task, doing so starts at a rudimentary level. By ensuring every employee is vigilant in implementing proper password security practices, an organization can greatly mitigate the risk of of a total network takeover.
Simply put, Rocket IT suggests that an organization’s leaders start by mandating a series of company-wide password security rules. Although, over the next few weeks, we’ll share some of these suggestions, it’s important to start by addressing the foundational cause of security breaches, a lack of password complexity.
Read MoreSeven Password Mistakes and How to Avoid Them
A different security breach hits the headlines on an almost daily basis. While you may not be too concerned about the safety of your LinkedIn profile after a quick password reset, you may still be committing some of the most common password mistakes. We’re sure your password is more secure than “password” (especially after our…
Read MoreNew Year, New Password
January is here, and we’re two weeks into the New Year. As we resolve to visit the gym, eat healthy and improve our finances, it’s also an ideal time to consider our digital life and ensure that we are taking all the necessary precautions to make sure that our data is safe and protected from…
Read More