Setting Up TFA Without Authenticator

tfaMaybe you like the idea of two-factor authentication, but the Google Authenticator smartphone app seems too cumbersome.  Or maybe you are not a smartphone owner, because you don’t like the idea of a phone that can track your location to within a few feet, and keeps sharing all your personal data with the apps on your phone.  So you own a flip phone with ...

Continue Reading →
0

Removing TFA from an Account in Authenticator

google-authenticatorGoogle Authenticator is my favorite go-to app for setting up two-factor authentication.  But what if you want to remove an account from Google Authenticator?

I set up two-factor authentication for Facebook and the Authenticator app did not work.  So I tried again, and ended up with two accounts on the Authenticator list, neither of which worked.  This pushed other working accounts down far enough that ...

Continue Reading →
0

Two Factor Authentication for WordPress

Hardening and securing WordPress websites is one of my specialties.  We have reported previously on three of the best WordPress security plugins, Sucuri, Bulletproof, and WordFence.  I can tell you that each of these plug-ins performed admirably against the continuous barrage of brute force and password reset attacks that my sites have endured.  Security appeared to be strong, but I wanted more.

I have been deploying two-factor authentication (TFA) everywhere I can, in order to overcome the inherent weakness of password ...

Continue Reading →
0

Smartphone and Tablet Security Solutions

smartphone-securityOn Wednesday we discussed the many, many ways your smartphone is vulnerable to attack.  Today we will look at solutions.  Smart mobile devices need to be secured just as you would a laptop or desktop computer  The small size and easy portability of smartphones and tablets make them easier to steal or lose.  Some of our recommendations:

  • Record the electronic serial number (ESN) of your phone or tablet. This is information you will ...
Continue Reading →
0

Inside the Perimeter

razor-wireAh, the good old days, when perimeter defenses and endpoint security software was all you needed to keep your network secure.  Was it ever really that simple? Probably not, but many business owners and IT professionals are still hoping that keeping the firewall and antivirus updated is enough.

Over 90% of exploits start as an email in somebody’s inbox.  According to NSS Labs, 97% of all breaches are enabled by ...

Continue Reading →
0

Adaptive Authentication To The Rescue

password1Keith Graham of SecureAuth was recently interviewed for a recent article on TechRepublic, and the subject of adaptive authentication came up.  He defined adaptive authentication this way:

“Adaptive authentication involves evaluating risk around the login process before the user even authenticates so that the system only steps up, or outright denies, the authentication when it deems a logon as a risk. Hence, it ...

Continue Reading →
0

Worst Passwords of 2015

bad-pwdHere are the 25 most commonly used passwords for 2014.  If your password is on this list, please understand that these passwords are among the first tried when automated password cracking software is used by a cyber-criminal.  So if yours is here, change it now.

Passwords are becoming problematic for several reasons.  The first, IMHO, is the use of email addresses as the user ID ...

Continue Reading →
0

Password Tips for 2016

password1Passwords – Is mine strong enough?  How do I know?  Every time I write a password article I feel as if this subject has already been done to death by me and others.  But I always get more positive feedback on this subject than others I consider more interesting, so we offer the following suggestions:

  • Use different passwords for personal and work systems.  That way ...
Continue Reading →
0

Facebook Offers Two-Factor Authentication

facebookFacebook has joined the crowd of major web services that allow you to set up two-factor authentication (2FA or TFA).  I just finished setting it up on my account, and I was please to see that it works with Google Authenticator.  According to the instructions, it will also work with the Facebook smartphone app for Android or iPhone.  Tech Republic has a great step by step tutorial, so I won’t ...

Continue Reading →
0
Page 4 of 7 «...23456...»