How Attackers Break Your Multi-Factor Authentication Protection and 7 Strategies to Protect Yourself
One of the best ways to thwart bad actors from logging in is to enable Multi-Factor Authentication (MFA), a.k.a. Two-Step Login. But attackers are bypassing that protection. If you know what MFA is, you can skip this paragraph. The most common first step of MFA is for...
How to Avoid Receiving Disturbing Photos via Apple AirDrop and Android Nearby
You’ve likely seen the video or at least heard the story of how a Southwest Airlines pilot responded to complaints from passengers that they received images of an unclothed person on their phone. The captain used the intercom system to scold the unknown passenger and...
Attackers are Targeting High Net Worth Individuals
An experienced high-level executive shared his concern about how attackers invest more time targeting high-net-worth individuals. If you fall into that category, especially now, you must be extra vigilant to protect yourself, your family, and your organization. The...