If Have I Been Pwned have these credentials then you can bet that the threat actors have them as well. Have I Been Pwned adds 71 million emails from Naz.API stolen account list (bleepingcomputer.com) Your takeaway from this It is important you and your team understand the importance of any …
More about passwords…
On Monday I ran a post about passkeys and the end of the password – but of course that is the future of cyber security, today we still depend on passwords. We all know a good password is a combination of upper and lower case letters with numbers and some …
Time to kill off the password…
I have written about “going passwordless” and using passkeys before, but it looks like 2024 is going to be the year of the passkey. Here is an excellent explanation from the BBC – take just two and a half minutes and find out why you and your organisation need to …
Back to passwords. Again!
It looks like I cannot get away from articles about passwords, which is not really a bad thing as passwords are still fundamental to everyone’s cyber security. I often read in the cyber security technical press that cyber attacks on even the biggest organisations start with the compromise of a …
We have done passwords, now let’s do MFA
Following on from the Back-to-Basics Password Primer mini-series – my latest article on CyberAwake is discussing the basics of multi-factor authentication (MFA): Back to Basics – MFA – CyberAwake In the next part I am going to discuss some of the weaknesses in MFA as a cyber security tool. Back …