With the average person managing 90 accounts that require a username and password, and credential-stealing malware on the rise, your users are firmly in the crosshairs of cyber criminals. At the same time, the drive toward workplace flexibility and desire to empower people to work where they are most comfortable challenges some foundations of cyber security. More work than ever … [Read more...]
2FA Gamification – Daily Security Byte
Gamification is a great way to encourage people to follow good security practices. Epic recently held a dance competition for a new Fortnite emote. Turns out you only get the emote if you use 2FA for your Epic login. In today's video, Corey shares why he thinks this is a great idea. Episode Runtime: 4:23 Direct YouTube … [Read more...]
Hacking Door Locks and Car Locks (Or Anything Wireless)
When a wireless device of any kind sends data from one location to another, the device needs to protect the data just as if it was traveling over a wired network. Unfortunately, that is often not the case as several security researchers proved at Black Hat and Def Con. Tools exist that allowed the researchers to capture data traveling over different types of wireless protocols … [Read more...]