The top-10 mistakes made when configuring enterprise IT systems
Mistakes commonly found in almost every large organization. What should the inforsec team look out for, and what protective measures should they take?
91 articles
Mistakes commonly found in almost every large organization. What should the inforsec team look out for, and what protective measures should they take?
Smiley passwords? Why ever not! The pros and cons of using emojis in passwords.
The already impressive list of Kaspersky Password Manager features has been expanded to include a built-in, cross-platform, two-factor authentication code generator.
After a hack, a company needs to improve security quickly and effectively. We outline the first steps to cyber-resilience.
What multi-factor authentication is, why you should use it, and what “factors” there are.
We explain how two-factor authentication with one-time codes works, what the benefits and risks are, and what else you can do to better protect your accounts.
Spam bots, GoDaddy hack, Twitter SMS 2FA and new research around kids’ attitudes to phishing – it’s the Transatlantic Cable!
More AI topics discussed this week, including AI-generated music and mugshots, the U.K. government banning encrypted phones & much more!
How authenticator apps work and what alternatives there are to Google Authenticator.
Kaspersky official blog Products for Family Security Solutions Premium protection Kaspersky Premium Complete protection for your devices, online privacy & identity Advanced protection Kaspersky Plus Combines security, performance & privacy
Microsoft cancels its decision to block macros by default. We discuss the cybersecurity implications for companies.
Let’s see how Google, Microsoft and Apple can work together to do away with passwords.
A detailed guide to the world of authenticator apps for those looking for an alternative to Google Authenticator.
Cybercriminals can target anyone who uses your applications; keeping users safe is also partly up to you.
This week on the podcast, we discuss the Twitch data breach, Facebook on illegal rainforest sales, free Google 2FA keys, and much more.
How to spot dangerous links sent in messages and other tricks scammers use to steal your data.
Can’t sign in to an account because your authenticator app is on a lost phone? Here’s what to do.
One click on a phishing link can cost a company both money and reputation. Here’s how to protect your company from phishing.