article thumbnail

Identity Threat Trends for Higher Education

Duo's Security Blog

As a new semester begins, we at Cisco Duo want to share some findings and trends pertaining to threat activity we have seen across higher education customers. In this situation, we can assume that they have either phished users’ first factor credentials (their password), or are crawling user accounts with weak, guessable passwords.

Education 116
article thumbnail

Cybersecurity Awareness Month: Resilient Multi-factor Authentication (MFA) and Strong Passwords

Thales Cloud Protection & Licensing

Cybersecurity Awareness Month: Resilient Multi-factor Authentication (MFA) and Strong Passwords. Awareness events foster to shape human attitude, enhance a positive culture against cyber threats, and educate businesses and people about protective measures they can take to secure their sensitive personal data: Enable MFA.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

2022 World Password Day: Educate Your Users About Good Password Hygiene

SecureWorld News

Even though World Password Day is over, it's never too late to remind your end-users that weak, unimaginative, and easy-to-guess passwords—like "123456," "qwerty," and, well… "password"—are poor options for securing accounts and devices. Improving password best practices matters.

article thumbnail

An educational robot security research

SecureList

” For instance, educational robots that connect to the internet and support video calls. Subject of the study: educational robot The toy is designed to educate and entertain children; it is an interactive device running the Android operating system. In other words, this is a “tablet on wheels.”

article thumbnail

WordPress Password Protection – A Complete Guide

Security Boulevard

What are the best methods of WordPress password protection for website administrators? This blog post examines the top password security options, such as strong password policies, password managers, two-factor authentication, educating users, and the use of other, wider safeguards.

article thumbnail

Check Point Warns of Hackers Targeting Its Remote Access VPN

SecureWorld News

In the advisory , Check Point says the attackers are targeting security gateways with old local accounts using insecure password-only authentication, which should be used with certificate authentication to prevent breaches. "We Switching from weak authentication to stronger authentication has multiple benefits.

VPN 62
article thumbnail

Challenges of User Authentication: What You Need to Know

Security Affairs

In the digital age, authentication is paramount to a strong security strategy. Which are the challenges of user authentication? In the digital age, authentication is paramount to a strong security strategy. User authentication seems easy, but there are inherent challenges to be aware of. User Authentication.