<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Password Security Archives - Foster Institute</title>
	<atom:link href="https://fosterinstitute.com/category/password-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://fosterinstitute.com/category/password-security/</link>
	<description>Cybersecurity Experts</description>
	<lastBuildDate>Fri, 19 Jul 2024 03:37:19 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://fosterinstitute.com/wp-content/uploads/2021/02/Favicon.png</url>
	<title>Password Security Archives - Foster Institute</title>
	<link>https://fosterinstitute.com/category/password-security/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Demystifying Questions Cyber Insurance Companies Will Ask You</title>
		<link>https://fosterinstitute.com/questions-cyber-insurance-companies-will-ask-you/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Mon, 08 Jul 2024 22:00:22 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Cybersecurity Audits]]></category>
		<category><![CDATA[Password Security]]></category>
		<category><![CDATA[Supporting IT Professionals]]></category>
		<category><![CDATA[Wireless Security]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5302</guid>

					<description><![CDATA[<p>If you have existing or are applying for new Cyber Insurance coverage, be prepared for the questionnaire. Knowing what they’ll ask can give you time to implement systems to answer “yes” to the questions affecting your premium rates and whether you’re still considered insurable. Common questions on insurance applications include: Do you use MFA? Multi-factor authentication [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/questions-cyber-insurance-companies-will-ask-you/">Demystifying Questions Cyber Insurance Companies Will Ask You</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>If you have existing or are applying for new Cyber Insurance coverage, be prepared for the questionnaire. Knowing what they’ll ask can give you time to implement systems to answer “yes” to the questions affecting your premium rates and whether you’re still considered insurable.</p>
<p><strong>Common questions on insurance applications include:</strong></p>
<p><strong>Do you use MFA?</strong> Multi-factor authentication means users must go through a second step when logging in. A prevalent method for the second factor is using an authentication application on users’ phones. It is essential to use a number-matching requirement so that a user must type in a code displayed on their phone into their computer before authentication. Another second factor is time-based one-time password (TOTP) apps on phones that display a number on the phone that the user enters as part of the authentication process. The number displayed in the app resets periodically, typically every 30 seconds. Other factors include using hardware keys that plug into USB ports and biometrics, including fingerprints or facial recognition. A typical second factor is receiving an SMS text message with a code, but that method is vulnerable to attacks such as SIM Swapping. In the interest of security, you should enforce MFA everywhere possible, including VPN, Remote Desktop, and SaaS offerings.</p>
<p><strong>Do you provide ongoing cybersecurity awareness training and periodic phishing simulation emails to measure worker proficiency?</strong> Your users must receive regular security awareness training, such as once per month and perhaps a comprehensive webinar or other presentation once a year. Additionally, services can send users a fraudulent or email phishing message once a month to measure their response, such as if they open the message, click on the simulated fraudulent link, and are duped into entering credentials. One often overlooked aspect of training and simulated phishing is that it might take time for your already overworked staff to configure, send, monitor, and produce reports about the results every month. You’re welcome to contact us to provide that service, and we do 100% of the work, so there is no additional burden on your workers. Training for new employees is available. We also provide comprehensive yearly training webinars and other presentations. Whatever training you use, be sure that it adapts to keep your users current with the rapidly evolving threat landscape.</p>
<p><strong>Do you provide password management tools to users?</strong> Tools that remember and automatically enter users’ passwords can help encourage users to use different passwords for every login. Users with the habit of reusing passwords pose a risk to your organization. Once attackers compromise a password, they will attempt to use that same password at popular sites. This practice is sometimes called credential stuffing, and attackers can be very successful at breaking into sites if users reuse passwords. An added benefit is user productivity and user happiness. Ensure the company&#8217;s password manager uses strong encryption to store your passwords securely. Single Sign-On (SSO) is becoming more popular, allowing users to log in once to access multiple sites or resources.</p>
<p><strong>Do you utilize geo-blocking or geo-filtering?</strong> These technologies identify computers, users, and email messages based on geographical locations. You will be more secure if you block email and login attempts from geographical areas where you never do business and block user logins from countries without users. While attackers can bypass these protections using VPNs, the protections are still helpful.</p>
<p><strong>Are users local administrators?</strong> When you set up a new Windows or Apple computer, the user has local administrator access and can perform many activities, including installing programs. If an attacker manages to compromise that user’s account, the attacker has tremendous power to compromise that computer and potentially your entire organization. This topic is complex, but the goal of every organization must be to ensure all workers are “standard users” on their computers. Being a standard user limits what an attacker can damage and makes the user account more difficult to compromise in the first place. Privilege Access Management (PAM) solutions help manage local admin rights by controlling and monitoring privileged access to critical systems.</p>
<p><strong>Do you segment your network?</strong> Network segmentation splits your network into smaller parts based on the purpose or type of device. For example, suppose you isolate your security cameras from your servers on a different network segment, such as a subnet or VLAN. If an attacker breaks into a security camera, segmentation can block their ability to hack your servers through the camera. Common segments include:</p>
<p>-Servers<br />
-Desktops and Laptops<br />
-Wireless Network<br />
-VPN users<br />
-Security cameras<br />
-VoIP systems<br />
-Different floors in your building or different buildings on your campus</p>
<p>It is possible to over-segment and create too much work for your IT Team, but that rarely happens. Your team will set up Access Control List (ACL) rules that limit communications between the segments to block unauthorized activities.</p>
<p><strong>Have you established a security baseline for your systems?</strong> Have a documented standard configuration for security controls you enforce on your servers, workstations, and mobile devices.</p>
<p><strong>How soon after release do you apply critical security updates to your devices?</strong> Microsoft, Apple, your firewall manufacturer, and other providers release security updates to programs to block attackers from using previously undetected security holes. You must apply the patches quickly to prevent attackers from exploiting the vulnerabilities. Testing patches before deployment is essential to avoid errors. Staging patches allows you to help ensure they don&#8217;t disrupt your production network. Zero-day patches and updates fix problems that attackers are already using to compromise systems.</p>
<p><strong>Do you allow workers to use family computers or mobile devices to access email and work from home?</strong> Family computers are significantly less secure than company-issued devices that your IT Team manages, monitors and protects 24×7. It is relatively common for organizations to permit users to use their BYOD phones to access company email. Your insurance company could see that as a red flag against providing or renewing a policy. You’ll want to demonstrate other safeguards you use to minimize the risk.</p>
<p><strong>Do you enforce EPP on all devices?</strong> Endpoint protection is a tool your IT Team can use to protect each device on your network. Ask your IT Team. Chances are they’ve implemented this solution. They might use Security Information and Event Management (SIEM) to enhance visibility and response. SIEM systems aggregate and analyze activity from different resources across your IT infrastructure.</p>
<p><strong>Do you utilize EDR/XDR tools?</strong> Using Endpoint Detection and Response (EDR), Extended Detection and Response (XDR), or Managed Detection and Response (MDR) agents on the laptops can increase security by monitoring for malicious behavior known as an indicator of compromise (IoC). EDR/XDR tools provide many benefits, including continuously monitoring network devices and watching for suspicious activities or evidence that an attacker is compromising a system. EDR/XDR is designed to identify, isolate, and mitigate threats. EDR and XDR must be effectively monitored, managed, and updated. One way many organizations ease the burden on their internal IT Teams is to utilize a third-party MSSP to perform these tasks. Managed Detection and Response (MDR) means you pay a third-party provider to manage your EDR/XDR. One key point to remember is that attackers can also obtain these protection tools and continually seek ways to bypass them. We perform Red Team Exercises at companies to test the capabilities of the EDR and XDR protections. Do not make the common mistake of letting your guard down in other security areas after implementing EDR or XDR.</p>
<p><strong>How frequently do you conduct internal and external security audits, vulnerability assessments, penetration tests, and Red Team Exercises?</strong> These tests identify previously undiscovered weaknesses in your security. Please get in touch with us if you need these services as part of a comprehensive security advisory service for executives to help them secure their organizations. We guide and become a resource for your existing IT team rather than replacing them.</p>
<p><strong>Does your spam filter scan messages and attachments for malicious links?</strong> If the answer is no, you need to add these features immediately.</p>
<p><strong>Do you use web filtering and DNS filtering?</strong> Web filtering features, often integrated with firewalls, allow your IT team to block known malicious sites, gambling, and other categories of websites. Domain Name Service (DNS) maps URL website names to addresses of servers on the web. DNS filtering services strive to identify malicious web servers and automatically block communications from your network to them. As a bonus, some services permit you to hinder users from accessing sites you might deem inappropriate.</p>
<p><strong>Do you use SPF for email messages?</strong> The Sender Policy Framework is a protective solution that your IT Team can enable to permit your email servers to confirm that inbound email messages came from an approved server rather than a fraudster impersonating or spoofing a legitimate source. While they are at it, your IT Team can enable DKIM to help other organizations’ mail servers confirm that messages they receive from you are legitimate and unaltered. They can configure DMARC to tell remote email servers to throw away messages from fraudsters attempting to impersonate your organization. It is essential to regularly review your SPF, DKIM, and DMARC records to adapt to the changing configurations and threat landscape.</p>
<p><strong>Do you identify storage locations and isolate PII, PHI, and other sensitive data?</strong> Determining where you store Personally Identifiable Information (PII), Protected Health Information (PHI), Cardholder Data (CHD), and other sensitive information is essential. Knowing where to store sensitive information is a fundamental step in protecting it. Do you keep the information isolated and protected? This identification and isolation is becoming even more critical due to the integration of AI into organizations, which might give AI access to company information.</p>
<p><strong>Do you use role-based access control (RBAC) to limit user access based on their job functions, and how do you manage and monitor privileged accounts? </strong>Role-Based Access Control (RBAC) ensures that users only have access to the data and systems necessary for their specific job functions. This minimizes the risk of unauthorized access to sensitive information. Privileged accounts with higher access levels are managed through Privilege Access Management (PAM) solutions that monitor and control their use, reducing the risk of misuse or compromise. Regular audits and real-time monitoring of these accounts are essential to detect and respond to suspicious activities.</p>
<p><strong>Do you encrypt sensitive data at rest and in transit, and what encryption standards do you use? </strong>Encryption is critical for protecting sensitive data when it is stored (at rest) and transmitted (in transit). Encryption standards such as Advanced Encryption Standard (AES) with 256-bit keys are commonly used to ensure robust security. Data at rest is encrypted to protect it from unauthorized access, even if physical security is breached. Data in transit is encrypted using protocols like TLS (Transport Layer Security) to prevent interception during transmission over networks.</p>
<p><strong>How do you assess and manage third-party vendors&#8217; cybersecurity risks and ensure vendors follow appropriate security practices? </strong>Third-party vendors can introduce significant cybersecurity risks. Assessing these risks involves regular security evaluations and audits of the vendors&#8217; practices. It’s important to have contracts that require vendors to follow appropriate security practices tailored to their roles and services. Continuous monitoring and periodic reassessments ensure that vendors maintain the required security posture over time. Organizations can manage risks by working collaboratively with vendors to meet security expectations without imposing stringent certification requirements.</p>
<p><strong>Do you use firewalls, intrusion detection/prevention systems (IDS/IPS), and other network security measures? </strong>Firewalls act as a barrier between the internal network and external threats, controlling incoming and outgoing traffic based on predetermined security rules. Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) monitor network traffic for suspicious activities and take action to prevent potential breaches. These network security measures are crucial for protecting against unauthorized access and cyberattacks.</p>
<p><strong>How do you secure remote access to your network? </strong>Securing remote access involves implementing measures such as Virtual Private Networks (VPNs), which encrypt the connection between remote users and the corporate network. Your IT professionals must manage remote devices to help increase security. Multi-factor authentication (MFA) adds an extra layer of security by requiring additional verification steps beyond just a password. Additionally, restricting remote access to only essential personnel and monitoring for unusual login activities are critical components of a secure remote access strategy. This is an extensive topic; please let us know if you want more information.</p>
<p><strong>What physical security measures do you have in place to protect your data centers and offices? </strong>Physical security measures are essential to protect data centers and office premises from unauthorized access. These measures include access control systems like key cards or biometric scanners, surveillance cameras, and security personnel. Secure facilities should also have environmental controls such as fire suppression systems and backup power supplies to safeguard against physical threats and disasters. The Foster Institute offers full-scale Physical Red Team Exercises to test your physical security measures.</p>
<p><strong>Are you compliant with relevant regulations and industry standards, such as GDPR, HIPAA, PCI-DSS, or ISO/IEC 27001, and how do you ensure ongoing compliance with these standards? </strong>Compliance with regulations and industry standards demonstrates a commitment to maintaining high security and privacy standards. Regular audits and assessments help ensure compliance with frameworks such as GDPR (General Data Protection Regulation), HIPAA (Health Insurance Portability and Accountability Act), PCI-DSS (Payment Card Industry Data Security Standard), and ISO/IEC 27001. Ongoing compliance is maintained through continuous monitoring, employee training, and updates to policies and procedures as standards evolve. Please let us know if you need help with achieving or maintaining compliance. The Foster Institute, Inc. can simplify and manage the process for you.</p>
<p><strong>How do you secure mobile devices employees use to access company data and use mobile device management (MDM) solutions to enforce security policies on mobile devices? </strong>Mobile Device Management (MDM) solutions enforce security policies on employees&#8217; mobile devices that access company data. These solutions can remotely manage and secure devices, ensuring they comply with organizational security standards. Features include enforcing strong passwords, encrypting data stored on the device, and remotely wiping data if a device is lost or stolen. This ensures that mobile devices do not become a weak point in the company&#8217;s overall security posture.</p>
<p><strong>Do you store backups offline or on immutable storage?</strong> If an attacker gains access with the intent of encrypting or deleting data to demand ransom, they might attempt to destroy your ability to restore. They know you’re more likely to pay the ransom if you cannot restore sensitive data. So, you must isolate some backup data so the attacker cannot damage it. It is essential to have backups that threat actors cannot delete or damage if they break into your network. Immutable storage is data stored where you can access it, but no users, not even your administrators, can delete or alter the backup files. Cloud providers, such as Microsoft, offer immutable cloud storage. Other devices use write-once-read-many (WORM) technology to store data immutably. Offline backup is disconnected from your network. Some companies might use backup tapes or hard drives disconnected from the network and store them in a safe location for offline storage. Other organizations have a secondary network, isolated from the primary network, dedicated to their backup servers; the only connection is a server that transfers production network data to the backup network. It is best to store backups in diverse locations for redundancy and eliminate any single points of failure.</p>
<p><strong>Do you encrypt your backups?</strong> If an unauthorized person accesses your backup data, it is useless if they cannot read the contents. Encryption is a setting in your backup software. There was a time when people wouldn’t encrypt backups because the backups would take much longer. With today’s technology, there should be little added time.</p>
<p><strong>How often do you practice the restore process?</strong> If you have never practiced your complete restore process, do it now. Many organizations find out they cannot restore from their backups. Often, their failed attempt was the first time they’d ever tried to restore. It can be complicated to perform a test restore, so be prepared to give your IT Team additional time. If you outsource your IT, it is understandable that they’ll charge you for practicing the restore. Always perform restore tests in a controlled environment, separate from your production systems.</p>
<p><strong>How long will it take to restore your data from backups?</strong> When you practice your complete restore process, measure the time it takes to restore. If you find out the duration is too long, you can take steps to speed up the process.</p>
<p><strong>What steps do you take to prevent ransomware attacks?</strong> This space on the insurance application allows you to list the items above in statement form. Almost all security measures you use can protect against ransomware attacks or limit the impact.</p>
<p><strong>Do you have a documented Disaster Recovery Plan (DRP) and Business Continuity Plan (BCP) in place?</strong> Documented disaster recovery plans demonstrate that you’ve thought through the processes required to recover from disruptive events. These plans should outline specific procedures for data recovery, system restoration, and maintaining business operations during and after an incident.</p>
<p><strong>Do you conduct disaster recovery drills?</strong> Regular drills ensure your team is prepared to execute the DRP and BCP effectively. These drills can be as basic as tabletop exercises, where team members discuss their roles and responses to hypothetical scenarios, or as comprehensive as full-scale exercises that simulate actual disaster conditions and involve all aspects of the organization.</p>
<p>These are some of the most common questions on our customer’s insurance policy application and renewal forms. If you find others, please reach out for guidance.</p>
<p>&nbsp;</p>
<p>The post <a href="https://fosterinstitute.com/questions-cyber-insurance-companies-will-ask-you/">Demystifying Questions Cyber Insurance Companies Will Ask You</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Rise of Passkeys: A Paradigm Shift in Authentication Technology</title>
		<link>https://fosterinstitute.com/the-rise-of-passkeys-a-paradigm-shift-in-authentication-technology/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Mon, 15 May 2023 16:17:51 +0000</pubDate>
				<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Email Security]]></category>
		<category><![CDATA[Family Security]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Password Security]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5466</guid>

					<description><![CDATA[<p>Be sure you, and your IT team, know about passkeys. Passkeys are the future, and the future is arriving now. Passkey authentication can be configured to be very secure based on four conditions: You must have your mobile device with you. (An attacker is unlikely to have the device with them.) You must be able [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/the-rise-of-passkeys-a-paradigm-shift-in-authentication-technology/">The Rise of Passkeys: A Paradigm Shift in Authentication Technology</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Be sure you, and your IT team, know about passkeys. Passkeys are the future, and the future is arriving now.</p>
<p>Passkey authentication can be configured to be very secure based on four conditions:</p>
<ol>
<li>You must have your mobile device with you. (An attacker is unlikely to have the device with them.)</li>
<li>You must be able to log in to your mobile device using facial recognition, a fingerprint, PIN, pattern, USB token, etc. Some people call passkeys a &#8220;Face&#8221; or &#8220;Fingerprint&#8221; sign-in.</li>
<li>Your device must have a unique key assigned to you that ties to a unique key at the site or application.</li>
<li>If you log into a site or application from a computer, the mobile device must be physically close to the computer where you&#8217;re logging in.</li>
</ol>
<p>Passkeys are new, and there is varying support for specific browsers, operating systems, and devices.</p>
<h2>Tips for Using Passkeys:</h2>
<ol>
<li>Start setting passkeys up on your mobile device, such as a smartphone, before you use your computer.</li>
<li>If the website or application does not allow you to set up a passkey on your computer:
<ul>
<li>Look for and select an option on the computer that says, &#8220;Use a passkey to log in,&#8221; Your computer will display a QR code image.</li>
<li>Use your phone&#8217;s camera to scan the QR code image displayed on your computer.</li>
<li>After scanning the QR code, your phone completes the passkey login process.</li>
</ul>
</li>
<li>It&#8217;s essential to confirm that passkeys work on all devices and browsers before disabling the old login method for each website or application. This way, you can avoid problems accessing your account if the passkey login method doesn&#8217;t work on some of your devices or browsers.</li>
</ol>
<p>As the adoption is just starting, you might discover limitations or frustrations, but they&#8217;ll disappear soon. Some people have great luck experimenting with setting up their first passkey at best buy dot com even if they don&#8217;t shop there.</p>
<p>Apple uses the Apple Keychain to store a passkey that should work on all your Apple devices after enrolling one. Google uses the Google Password Manager in the Chrome browser and Android. Microsoft uses Microsoft Hello. Some password managers store keys.</p>
<p>Mobile device backups and some password managers are designed to back up the passkeys in case you lose your phone. If you do lose your phone, it is a good idea to go to the apps and sites to set up a new key and disable your old key. One concern is that, if an attacker can access your backups or the passkey manager and obtain a key from there, they might find a way to bypass passkey protection. But that doesn&#8217;t necessarily make passkeys less secure than other authentication methods; they may well be the best protection available when implemented properly since they offer so many benefits:</p>
<ol>
<li>Users cannot be tricked into giving away passkey values they do not know in social engineering and phishing attacks.</li>
<li>Since passkeys come in unique pairs, users cannot re-use passwords, another user mistake that leads to compromised passwords.</li>
<li>Keyloggers cannot capture passwords since users are not typing passwords.</li>
</ol>
<p>Your IT team might choose to eliminate your existing Multi-Factor authentication process since using passkeys involves multiple factors already. Unlike SMS text messages, passkeys cannot be redirected to attackers. Passkeys are immune to MFA Fatigue addressed here <a href="https://fosterinstitute.com/mfa-fatigue-the-hidden-danger-and-how-to-combat-it/">https://fosterinstitute.com/mfa-fatigue-the-hidden-danger-and-how-to-combat-it/</a></p>
<p>Please forward this to your friends so they can explore eliminating passwords and eventually start adopting passkeys as Passkey support expands.</p>
<p>Prepare yourself for what would happen if an attacker steals a phone containing passkeys: <a href="https://fosterinstitute.com/the-risk-iphone-theft-poses-to-your-passkeys-and-what-to-do-now/" target="_blank" rel="noopener">https://fosterinstitute.com/the-risk-iphone-theft-poses-to-your-passkeys-and-what-to-do-now/</a></p>
<h2>Technical Details &#8211; If You are Interested</h2>
<p>You do not need to know this to use passkeys. But if you wonder how these keys can be so secure, read on.</p>
<p>Passkeys are much more secure because passkeys come in key pairs. When you use one key of the pair to lock something, you must use the paired key to unlock it. Only the paired key can unlock what the first key locked.</p>
<p>So for each site or application you set up to use a passkey, your mobile device generates a pair of keys:<br />
&#8211; A unique private key for that site or application is stored on your device.<br />
&#8211; A paired key that your device sends to the site or application which stores the key just for you.</p>
<p>If you have a passkey set up for 100 sites or applications, your device will store 100 keys. Sites that have 100 million users will have 100 million keys. Each key is half of a pair. The private key must be kept secret on your device to be secure. Even if attackers access all the keys for a site or application, your account is still protected since they won&#8217;t have the second key stored solely on your device.</p>
<p>If you want to get more technical and understand why passkeys are so resistant to person-in-the-middle attacks: Websites that start with https:// and most web applications use PKI encryption to protect data during transit. SSL (deprecated) and TLS (use the newest version) protocols use public-private key pairs to initiate a multi-step process to secure traffic to websites or web applications. Attackers can use person-in-the-middle attacks to defeat that encryption. They generate key pairs to make the user&#8217;s connection think the attacker is the website and make the website believe the attacker is the user&#8217;s connection. Bad actors insert themselves between the user and the website and can access the data as it goes through their connection.</p>
<p>When a user creates a passkey, the user’s device generates a key pair. It stores one key locally on the device and sends the other to the site or application for passkey authentication. The site or web application stores a unique key for each passkey a user generates. The secret key never leaves the user&#8217;s device during the authentication process, and the unique paired key is stored at the website or application. Hence, passkeys are extremely resistant to person-in-the-middle attacks.</p>
<p>Where supported, consider using passkeys. Hopefully they&#8217;ll be the common standard soon.</p>
<p>Subscribe to maximize your executive potential with Foster Institute&#8217;s E-Savvy Newsletter, packed with practical IT security solutions and actionable strategies for success: <a href="https://fosterinstitute.com/e-savvy-newsletter/">https://fosterinstitute.com/e-savvy-newsletter/</a></p>
<p>&nbsp;</p>
<p>The post <a href="https://fosterinstitute.com/the-rise-of-passkeys-a-paradigm-shift-in-authentication-technology/">The Rise of Passkeys: A Paradigm Shift in Authentication Technology</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Ditch Passwords for Good: The Ultimate Guide to Passkeys and Passwordless Authentication</title>
		<link>https://fosterinstitute.com/ditch-passwords-for-good-the-ultimate-guide-to-passkeys-and-passwordless-authentication/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 04 May 2023 20:06:50 +0000</pubDate>
				<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Email Security]]></category>
		<category><![CDATA[Family Security]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Password Security]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5450</guid>

					<description><![CDATA[<p>Why to Go Passwordless: When you eliminate passwords: &#8211; You don&#8217;t need to worry about creating, forgetting, or re-using passwords because you don&#8217;t use passwords. &#8211; IT Helpdesk Professionals save time since they don&#8217;t have to help users who forget their passwords. &#8211; Hackers will not try to trick users into disclosing passwords because the [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/ditch-passwords-for-good-the-ultimate-guide-to-passkeys-and-passwordless-authentication/">Ditch Passwords for Good: The Ultimate Guide to Passkeys and Passwordless Authentication</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Why to Go Passwordless:</h2>
<p>When you eliminate passwords:<br />
&#8211; You don&#8217;t need to worry about creating, forgetting, or re-using passwords because you don&#8217;t use passwords.<br />
&#8211; IT Helpdesk Professionals save time since they don&#8217;t have to help users who forget their passwords.<br />
&#8211; Hackers will not try to trick users into disclosing passwords because the user won&#8217;t know passwords.</p>
<p>Microsoft, and others, continue to make their big push for people to go passwordless.</p>
<h2>Alternatives to Passwords:</h2>
<p>Today, determine where and how you can eliminate passwords from your life. Focus on using:</p>
<p>Something you have:<br />
&#8211; A USB Token such as a YubiKey<br />
&#8211; A proximity badge you wear around your neck or carry in your pocket<br />
&#8211; An authenticator app on your smartphone or tablet<br />
&#8211; A text message, phone call, or email with a one-time code</p>
<p>Or, something you are:<br />
&#8211; A fingerprint scan<br />
&#8211; Facial recognition<br />
&#8211; Eye recognition</p>
<p>And the real magic is when you combine two for multi-factor authentication (MFA) without passwords.</p>
<p>Note that USB tokens can include fingerprint scanners for built-in MFA. Your IT Team might need to get creative using mobile phone technology to accomplish both. If you decide to use push notifications, be sure to refer to <a href="https://fosterinstitute.com/mfa-fatigue-the-hidden-danger-and-how-to-combat-it/">https://fosterinstitute.com/mfa-fatigue-the-hidden-danger-and-how-to-combat-it/</a></p>
<p>There are few ways attackers can exploit some of these login methods, and your IT Team can help you shore up weaknesses. Visit with your IT Team about ways you can eliminate passwords. Be sure they&#8217;ve seen this post: <a href="https://fosterinstitute.com/the-risk-iphone-theft-poses-to-your-passkeys-and-what-to-do-now/" target="_blank" rel="noopener">https://fosterinstitute.com/the-risk-iphone-theft-poses-to-your-passkeys-and-what-to-do-now/</a></p>
<h2>Know About Passkeys:</h2>
<p>Be sure you, and your IT team, know about passkeys. Passkeys are the future, and the future is arriving now: <a href="https://fosterinstitute.com/the-rise-of-passkeys-a-paradigm-shift-in-authentication-technology/">https://fosterinstitute.com/the-rise-of-passkeys-a-paradigm-shift-in-authentication-technology/</a></p>
<p>Subscribe to maximize your executive potential with Foster Institute&#8217;s E-Savvy Newsletter, packed with practical IT security solutions and actionable strategies for success: <a href="https://fosterinstitute.com/e-savvy-newsletter/">https://fosterinstitute.com/e-savvy-newsletter/</a></p>
<p>&nbsp;</p>
<p>The post <a href="https://fosterinstitute.com/ditch-passwords-for-good-the-ultimate-guide-to-passkeys-and-passwordless-authentication/">Ditch Passwords for Good: The Ultimate Guide to Passkeys and Passwordless Authentication</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>MFA Fatigue: The Hidden Danger and How to Combat It</title>
		<link>https://fosterinstitute.com/mfa-fatigue-the-hidden-danger-and-how-to-combat-it/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 28 Apr 2023 17:50:21 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[Password Safety]]></category>
		<category><![CDATA[Password Security]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5443</guid>

					<description><![CDATA[<p>Benefits you will experience with the upgrade from Chat GPT-3.5 to Chat GPT-4 include:</p>
<p>The post <a href="https://fosterinstitute.com/mfa-fatigue-the-hidden-danger-and-how-to-combat-it/">MFA Fatigue: The Hidden Danger and How to Combat It</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Attackers notoriously figure out users’ passwords; hence, organizations and individuals must make logging in more secure.</p>
<p>Logins often go like this:<br />
1. User enters a password<br />
2. The user receives a text message with a code to confirm it is them</p>
<p>That second step is called MFA (Multi-Factor Authentication).</p>
<p>Entering numbers is frustrating, so some organizations use push notifications:<br />
1. User enters a password<br />
2. The user has an authenticator app asking, “Is that you trying to log in?” The user can click “Yes,” and they’re in. If it is an attacker, the user can ignore the alert or click “no.”</p>
<p>Attackers are overwhelmingly bypassing push notification protection. Here&#8217;s how: Once the bad guys obtain the user’s password, they make frequent attempts to log in, sending many alerts to the targeted user’s phone. The user is annoyed by the interruptions. Sometimes, users click &#8220;approve&#8221; to stop the annoyance. They don’t realize they are allowing an attacker into the system. <strong>This phenomenon is known as MFA fatigue.</strong></p>
<p>If you use push notifications, ensure that your push notifications require the user to enter at least two digits displayed on the device where they entered the password rather than simply pressing the approve button in their phone app. This verification helps prove the user has the device. The process becomes:<br />
1. The user enters a password on the device they’re logging into.<br />
2. The user has an authenticator app asking them, “What code is your device displaying?” The user enters the code, and they’re logged in.</p>
<p>Microsoft calls the process “Number Matching.” Duo calls it “Verified Duo Push.” Okta calls this a number challenge.</p>
<p>If you use push notifications, enable some form of number matching verification ASAP to combat MFA Fatigue.</p>
<p>Please tell your friends to be sure they know this hidden danger and can tighten security in their organizations.</p>
<p>The post <a href="https://fosterinstitute.com/mfa-fatigue-the-hidden-danger-and-how-to-combat-it/">MFA Fatigue: The Hidden Danger and How to Combat It</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Know Why Web Application Providers Show Dots when You Type Your Passwords</title>
		<link>https://fosterinstitute.com/know-why-web-application-providers-show-dots-when-you-type-your-passwords/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Tue, 13 Dec 2022 21:15:56 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Password Security]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5356</guid>

					<description><![CDATA[<p>Dalmatians have dots, and so should your screen when you enter your password. Those dots help prevent screen recordings from capturing your passwords. If you have malware on your phone, tablet, or computer, it could be recording images of your screen as you type. If the malware can only see dots, your password is safe [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/know-why-web-application-providers-show-dots-when-you-type-your-passwords/">Know Why Web Application Providers Show Dots when You Type Your Passwords</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Dalmatians have dots, and so should your screen when you enter your password. Those dots help prevent screen recordings from capturing your passwords.</p>
<p>If you have malware on your phone, tablet, or computer, it could be recording images of your screen as you type. If the malware can only see dots, your password is safe from “shoulder surfers” looking at your screen from thousands of miles away.</p>
<p>Additionally, if you use language translation or other browser plug-ins that read your screen, your browsers could be “reading” the text on your screen. If web applications or websites display your actual password, it might get transmitted to strangers without you realizing it.</p>
<p>It can be frustrating not to see your password as you type, but there is a good reason beyond knowing the person next to you isn’t watching your screen.</p>
<p>For information about preventing malware on your systems, please visit the Foster Institute Blog at <a href="https://fosterinstitute.com/blog" target="_blank" rel="noopener">fosterinstitute.com/blog</a></p>
<p>&nbsp;</p>
<p>The post <a href="https://fosterinstitute.com/know-why-web-application-providers-show-dots-when-you-type-your-passwords/">Know Why Web Application Providers Show Dots when You Type Your Passwords</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How Attackers Break Your Multi-Factor Authentication Protection and 7 Strategies to Protect Yourself</title>
		<link>https://fosterinstitute.com/how-attackers-break-your-multi-factor-authentication-protection-and-7-strategies-to-protect-yourself/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 16 Nov 2022 22:36:53 +0000</pubDate>
				<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Email Security]]></category>
		<category><![CDATA[Family Security]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Password Security]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5351</guid>

					<description><![CDATA[<p>One of the best ways to thwart bad actors from logging in is to enable Multi-Factor Authentication (MFA), a.k.a. Two-Step Login. But attackers are bypassing that protection. If you know what MFA is, you can skip this paragraph. The most common first step of MFA is for users to enter their username and password. They [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/how-attackers-break-your-multi-factor-authentication-protection-and-7-strategies-to-protect-yourself/">How Attackers Break Your Multi-Factor Authentication Protection and 7 Strategies to Protect Yourself</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>One of the best ways to thwart bad actors from logging in is to enable Multi-Factor Authentication (MFA), a.k.a. Two-Step Login. But attackers are bypassing that protection.</p>
<p>If you know what MFA is, you can skip this paragraph. The most common first step of MFA is for users to enter their username and password. They receive a text message with a code to complete the login process. Alternatively, the user might have an authenticator app on their phone that provides a code. Another option is for the user to receive a “push” notification asking the user to approve the login through the app. The latter is sometimes referred to as one-tap login. There are other options for the factors, including approving specific computers, geo-location, USB hardware keys, and biometrics, including fingerprints, facial recognition, and iris scans. There are pros and cons to each.</p>
<p>Summarized steps you can take to help protect yourself from attackers bypassing multi-factor authentication:</p>
<p>= Know how to protect yourself against a thief stealing a phone if MFA uses text or email messages as the second step.<br />
= If supported, instead of a code number from a text message or authenticator app, consider using a USB token, fingerprint, or facial recognition for the second factor.<br />
= Reduce the duration a code is valid. For example, perhaps change the code every 60 seconds so an older code won’t work.<br />
= Limit the number of failed login attempts in a specific period.<br />
= Implement web content filtering to help protect users from being exposed to fake login screens.<br />
= Limit logins to specific countries.<br />
= If users primarily use the same device, restrict logins to specific devices.<br />
= Train users to beware of fraudulent login prompts.</p>
<p>Please see the details below:</p>
<p>If MFA to sends a text message to a stolen phone, the thief might see the text message. For websites or services that only support text messages for the second step, consider investing in an inexpensive flip phone with a different phone number to receive text messages. Similarly, if MFA involves an email, and the thief can easily access your email on the stolen phone, it defeats the purpose of MFA. Therefore, if you set up the two-step login with email as the second step, use an email address that requires some other form of authentication on the phone to access email messages. Ensure email messages do not pop up on the preview screen when received.</p>
<p>Another way attackers bypass MFA:<br />
Step 1: Trick the user into clicking a link that takes the user to a fake login screen for Microsoft 365, LinkedIn, or any other valuable site.<br />
Step 2: The user enters their username and password into the fake login form. Now the attacker knows the user’s login name and password.<br />
Step 3: The attacker’s computer pulls up the genuine login form and enters the username and password the victim just provided.<br />
Step 4: The legitimate website sends the user the text message, sends a push notification, or performs another second factor the user is used to. The user expects this, and the process seems normal to them.<br />
Step 5: The attacker can create a fake form for the user to enter the code from their text message or app. When the victim enters the data, the attacker’s computer inserts the data into the genuine website. If the user received a push notification, they could approve the login because the user believes they are indeed logging into the site.<br />
Step 6: The attacker is logged in and has the user’s full access. The attacker needed no previous knowledge of the user’s username, password, or text key.</p>
<p>One strategy to fight his kind of attack is to use a second factor that isn’t a text code. For example, a user doesn’t need to enter a code if the second factor is a fingerprint or USB token plugged into the computer. The user cannot enter that information into a fraudulent login screen.</p>
<p>Another common strategy attackers use to bypass MFA is to reduce the time an OTP (One Time Password) code can work without the user requesting and receiving a new text message or generating a new code in the authenticator app. Shorter expiration times mean the attackers must use the stolen credentials and second factor to log in more quickly.</p>
<p>Another strategy, though slightly less effective but can be used in conjunction, is to limit the number of failed login attempts within a period. An example rule is if there is a failed login attempt for a user account three times in a row within five minutes, lock their account so they cannot try logging in again for ten minutes.</p>
<p>A useful cybersecurity control that is underutilized is conditional access by country. If your users will always log in from specific countries, block logins from all other countries. That will make it more difficult for foreign adversaries to compromise your users’ accounts. Identifying a user’s location is sometimes referred to as geolocation.</p>
<p>Another method to bypass MFA is to use social engineering to trick the user into disclosing their username, password, and code or another second factor. A typical example is for a bad actor to contact a user, impersonate a technical support person, and ask the user to provide the information to help prevent some fake problem that doesn’t exist. Some trusting users walk the attacker through the login process, bypassing the protection of MFA.</p>
<p>Another strategy bad actors use is called MFA fatigue. The hacker will make so many attempts to log on that the user finally tires of receiving push notification alerts. The fatigued user approves the login to make their phone be quiet, and the attacker is in the system.</p>
<p>Attackers could use SIM Swapping to reroute calls and text messages to their phones. Therefore, text and callbacks can be less secure than other second factors. However, many sites only offer those two options.</p>
<p>As your IT team can tell you, there are more technical ways for attackers to bypass MFA by creating person-in-the-middle attacks using something called a proxy. Another strategy attackers can utilize is captured authentication cookies or tokens. Authentication can rely on digital key values that must be kept secret inside servers. If attackers get access to the keys, they can gain access.</p>
<p>Your IT Team can implement some form of web content filtering and configure it to block communications with known malicious sites and attacker command-and-control servers. This isn’t perfect because attackers frequently change command servers, but it helps.</p>
<p>Using SSO (Single Sign On) reduces the number of opportunities an attacker has to trick the user. Of course, the flip side is that if an attacker successfully gains access to the single sign-on, the attacker won’t need any other credentials to access everything the user can access.</p>
<p>User training is essential, as is keeping the computer safe.</p>
<p>As you can see, using MFA does not mean your authentication process is secure. Whenever a new security control is invented, someone finds a way to break it. The strategies above will help you be more secure.</p>
<p>Alert your friends to some of the ways attackers can bypass MFA. They might decide to consider using USB keys, biometrics, or cryptographic codes stored in a computer or hardware.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>The post <a href="https://fosterinstitute.com/how-attackers-break-your-multi-factor-authentication-protection-and-7-strategies-to-protect-yourself/">How Attackers Break Your Multi-Factor Authentication Protection and 7 Strategies to Protect Yourself</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Attackers are Targeting High Net Worth Individuals</title>
		<link>https://fosterinstitute.com/attackers-are-targeting-high-net-worth-individuals/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 08 Sep 2022 12:00:25 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Cybersecurity Audits]]></category>
		<category><![CDATA[Family Security]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Password Security]]></category>
		<category><![CDATA[Wireless Security]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2693</guid>

					<description><![CDATA[<p>An experienced high-level executive shared his concern about how attackers invest more time targeting high-net-worth individuals. If you fall into that category, especially now, you must be extra vigilant to protect yourself, your family, and your organization. The exploits may come in the form of attempts to get you to transfer money to a friend, [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/attackers-are-targeting-high-net-worth-individuals/">Attackers are Targeting High Net Worth Individuals</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>An experienced high-level executive shared his concern about how attackers invest more time targeting high-net-worth individuals. If you fall into that category, especially now, you must be extra vigilant to protect yourself, your family, and your organization.</p>
<p>The exploits may come in the form of attempts to get you to transfer money to a friend, someone threatening to send out defamatory information about you unless you pay them not to, or phony messages attempting to acquire some personally identifiable information from you.</p>
<p>Be sure to alert your family members that it could be a forgery, even if an email message appears to be from you. Family members should verbally speak to you if there is ever a concern about any communications that are purportedly from you. No one should ever respond to a suspicious email or text message.</p>
<p>Know that legitimate text messages claiming to be from organizations are usually from a five to six-digit source such as 26096. If the text message is from a phone number they don&#8217;t recognize, even if the digits are all run together, like 4105550009, there is a good chance the text is fraudulent.</p>
<p>Additionally, there are crucial steps you must take to help protect your devices, including iPhones, iPads, Android phones and tablets, laptops, desktop computers, and all of your devices. Keep the devices locked up when they are not in your possession. If someone gains physical access to your device, it is possible that they can steal information, both your history and real-time now and into the future.</p>
<p>Be sure to apply critical security updates to the operating systems and browsers when prompted. But watch out for fake requests. Update alerts should never come via email or text message; those are bogus and dangerous.</p>
<p>Avoid connecting to public WiFi networks in coffee shops, airports, and hotels. Using your phone as a hotspot is much safer. A VPN protects your privacy but doesn&#8217;t prevent attackers from targeting your device on the network.</p>
<p>Avoid using a family computer to do your online banking, connect to your office, or type sensitive information. Attackers seek to infect work-from-home computers, and family computers are often the most vulnerable. Use your laptop or computer dedicated to you so that another family member doesn&#8217;t accidentally install malware for attackers to monitor your keystrokes, take control, or dwell inside, waiting for you to log in to your office.</p>
<p>There are so many steps to take, and, primarily, you must have a heightened awareness that you are at an increased risk of attacks as a high net-worth individual. Consider having a cybersecurity advisor to guide you and your team as you increase your security. Be sure they hold top-level cybersecurity certifications, including CISSP, CEH, and CISA, to help you receive the best guidance.</p>
<p>Please forward this to your friends so that they are extra vigilant too.</p>
<p>The post <a href="https://fosterinstitute.com/attackers-are-targeting-high-net-worth-individuals/">Attackers are Targeting High Net Worth Individuals</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Anatomy of a Password Attack, and How to Prevent Them</title>
		<link>https://fosterinstitute.com/anatomy-of-a-password-attack-and-how-to-prevent-them/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 09 Jun 2022 22:13:47 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Password Security]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5260</guid>

					<description><![CDATA[<p>Password attacks against businesses happen all the time. You can protect your organization. Imagine that your firewall has doors to allow connections into your network. Usernames and passwords are the keys to unlocking the doors. An effective cybersecurity control is to remove the doors. When there is no door, there is no keyhole for an [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/anatomy-of-a-password-attack-and-how-to-prevent-them/">Anatomy of a Password Attack, and How to Prevent Them</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Password attacks against businesses happen all the time. You can protect your organization.</p>
<p>Imagine that your firewall has doors to allow connections into your network. Usernames and passwords are the keys to unlocking the doors. An effective cybersecurity control is to remove the doors. When there is no door, there is no keyhole for an attacker to try to guess the keys.</p>
<p>Many organizations have too many open doors exposed to the world. An essential cybersecurity control is to remove the entries. Alternatively, if you must have the door, your IT team can configure the firewall with a cloaking strategy so that only specific sources can see the door. Most people would never know there is a door.</p>
<p>Ask your IT team to close external ports that are not essential to doing business. If they must leave ports open, ask them to create rules to limit access to specific source addresses if possible.</p>
<p>Below is information from the security log file on a server tracking failed login attempts. For a brute-force password guessing attack, the attackers must also guess usernames. They can predict usernames such as Administrator, so they try many passwords, 1398 in the example below, for predictable names.</p>
<p>If your IT team shows you a list of guessed names, and the guessed usernames match workers in your organization, that is a severe concern. It means that the attackers have done their research or already have access. You are a specific target. Remember, if there is no door, then these attacks cannot happen:</p>
<p>1398 different passwords attempted with this guessed username: Administrator<br />
836 different passwords attempted with this guessed username: Admin<br />
554 different passwords attempted with this guessed username: user<br />
314 different passwords attempted with this guessed username: test<br />
314 different passwords attempted with this guessed username: user1<br />
160 different passwords attempted with this guessed username: user2<br />
156 different passwords attempted with this guessed username: user3<br />
156 different passwords attempted with this guessed username: admin1<br />
155 different passwords attempted with this guessed username: test1<br />
111 different passwords attempted with this guessed username: guest<br />
91 different passwords attempted with this guessed username: sql<br />
89 different passwords attempted with this guessed username: aspnet<br />
87 different passwords attempted with this guessed username: support_388945a0<br />
84 different passwords attempted with this guessed username: david<br />
83 different passwords attempted with this guessed username: root<br />
82 different passwords attempted with this guessed username: backup<br />
80 different passwords attempted with this guessed username: sys<br />
80 different passwords attempted with this guessed username: support<br />
80 different passwords attempted with this guessed username: Other<br />
80 different passwords attempted with this guessed username: a<br />
78 different passwords attempted with this guessed username: test2<br />
78 different passwords attempted with this guessed username: server<br />
78 different passwords attempted with this guessed username: 1<br />
78 different passwords attempted with this guessed username: john<br />
78 different passwords attempted with this guessed username: test3<br />
78 different passwords attempted with this guessed username: console<br />
78 different passwords attempted with this guessed username: owner<br />
78 different passwords attempted with this guessed username: actuser<br />
78 different passwords attempted with this guessed username: 123<br />
78 different passwords attempted with this guessed username: adm<br />
78 different passwords attempted with this guessed username: admin2<br />
78 different passwords attempted with this guessed username: user4<br />
78 different passwords attempted with this guessed username: user5<br />
32 different passwords attempted with this guessed username: surferquest<br />
18 different passwords attempted with this guessed username: auditor<br />
15 different passwords attempted with this guessed username: alilong<br />
14 different passwords attempted with this guessed username: SCOTT<br />
13 different passwords attempted with this guessed username: chirotouch<br />
13 different passwords attempted with this guessed username: PEGGY<br />
12 different passwords attempted with this guessed username: follow<br />
12 different passwords attempted with this guessed username: CHERYL<br />
12 different passwords attempted with this guessed username: TERRI<br />
11 different passwords attempted with this guessed username: ETB User<br />
10 different passwords attempted with this guessed username: system_backupDB<br />
10 different passwords attempted with this guessed username: QBPOSDBSrvUser<br />
10 different passwords attempted with this guessed username: xuhai<br />
10 different passwords attempted with this guessed username: tu<br />
9 different passwords attempted with this guessed username: mroot<br />
9 different passwords attempted with this guessed username: manager<br />
9 different passwords attempted with this guessed username: justin<br />
8 different passwords attempted with this guessed username: iis<br />
8 different passwords attempted with this guessed username: Linux<br />
7 different passwords attempted with this guessed username: acs<br />
7 different passwords attempted with this guessed username: vetvault<br />
7 different passwords attempted with this guessed username: squirrel<br />
7 different passwords attempted with this guessed username: user01<br />
7 different passwords attempted with this guessed username: crsuser<br />
6 different passwords attempted with this guessed username: saleslan<br />
6 different passwords attempted with this guessed username: IUSR_SOR<br />
6 different passwords attempted with this guessed username: scan<br />
6 different passwords attempted with this guessed username: expedite<br />
6 different passwords attempted with this guessed username: DSNVSUser<br />
6 different passwords attempted with this guessed username: reception<br />
6 different passwords attempted with this guessed username: hei<br />
6 different passwords attempted with this guessed username: VNIAdmin_DoNotDelete<br />
6 different passwords attempted with this guessed username: kaypro<br />
6 different passwords attempted with this guessed username: payroll<br />
6 different passwords attempted with this guessed username: mark<br />
6 different passwords attempted with this guessed username: alex<br />
6 different passwords attempted with this guessed username: linhai<br />
6 different passwords attempted with this guessed username: ntsec_admin<br />
6 different passwords attempted with this guessed username: lisa<br />
6 different passwords attempted with this guessed username: oprrs<br />
6 different passwords attempted with this guessed username: monster<br />
5 different passwords attempted with this guessed username: Acsadmin<br />
5 different passwords attempted with this guessed username: cli<br />
5 different passwords attempted with this guessed username: awesen<br />
5 different passwords attempted with this guessed username: aloha<br />
5 different passwords attempted with this guessed username: micrologic<br />
5 different passwords attempted with this guessed username: scanner<br />
5 different passwords attempted with this guessed username: swentz<br />
5 different passwords attempted with this guessed username: jacob<br />
5 different passwords attempted with this guessed username: jordan<br />
5 different passwords attempted with this guessed username: backoffice<br />
5 different passwords attempted with this guessed username: amiga<br />
5 different passwords attempted with this guessed username: pos<br />
4 different passwords attempted with this guessed username: warehouse<br />
4 different passwords attempted with this guessed username: rdspos<br />
4 different passwords attempted with this guessed username: linda<br />
4 different passwords attempted with this guessed username: copier<br />
4 different passwords attempted with this guessed username: rds<br />
4 different passwords attempted with this guessed username: acasey<br />
4 different passwords attempted with this guessed username: mary<br />
4 different passwords attempted with this guessed username: sapsupport<br />
4 different passwords attempted with this guessed username: Post6<br />
4 different passwords attempted with this guessed username: james<br />
4 different passwords attempted with this guessed username: micros<br />
4 different passwords attempted with this guessed username: spppse<br />
4 different passwords attempted with this guessed username: possvr<br />
4 different passwords attempted with this guessed username: apple_terminal<br />
3 different passwords attempted with this guessed username: shipping<br />
3 different passwords attempted with this guessed username: manw<br />
3 different passwords attempted with this guessed username: MssqlUser<br />
3 different passwords attempted with this guessed username: miass<br />
3 different passwords attempted with this guessed username: receptionist<br />
3 different passwords attempted with this guessed username: grace<br />
3 different passwords attempted with this guessed username: iusr_qa<br />
3 different passwords attempted with this guessed username: hk<br />
3 different passwords attempted with this guessed username: fax<br />
3 different passwords attempted with this guessed username: menw<br />
3 different passwords attempted with this guessed username: sales<br />
3 different passwords attempted with this guessed username: parts<br />
3 different passwords attempted with this guessed username: Tsmotw<br />
3 different passwords attempted with this guessed username: svc-netmon<br />
3 different passwords attempted with this guessed username: staff<br />
3 different passwords attempted with this guessed username: adminsc5<br />
3 different passwords attempted with this guessed username: ssyyet<br />
3 different passwords attempted with this guessed username: sysadmin<br />
3 different passwords attempted with this guessed username: ashley<br />
3 different passwords attempted with this guessed username: araxi<br />
3 different passwords attempted with this guessed username: ccdrs<br />
3 different passwords attempted with this guessed username: ava<br />
3 different passwords attempted with this guessed username: Cat<br />
3 different passwords attempted with this guessed username: Spectra<br />
3 different passwords attempted with this guessed username: tech<br />
3 different passwords attempted with this guessed username: voicemail<br />
3 different passwords attempted with this guessed username: adm1n<br />
3 different passwords attempted with this guessed username: terry<br />
3 different passwords attempted with this guessed username: Administrador<br />
2 different passwords attempted with this guessed username: laptop<br />
2 different passwords attempted with this guessed username: lab<br />
2 different passwords attempted with this guessed username: Astsm<br />
2 different passwords attempted with this guessed username: larry<br />
2 different passwords attempted with this guessed username: lee<br />
2 different passwords attempted with this guessed username: billing<br />
2 different passwords attempted with this guessed username: besadmin<br />
2 different passwords attempted with this guessed username: bill<br />
2 different passwords attempted with this guessed username: joshua<br />
2 different passwords attempted with this guessed username: kathy<br />
2 different passwords attempted with this guessed username: avery<br />
2 different passwords attempted with this guessed username: beadmin<br />
2 different passwords attempted with this guessed username: Kantech<br />
2 different passwords attempted with this guessed username: keith<br />
2 different passwords attempted with this guessed username: kiosk<br />
2 different passwords attempted with this guessed username: aubrey<br />
2 different passwords attempted with this guessed username: joseph<br />
2 different passwords attempted with this guessed username: benjamin<br />
2 different passwords attempted with this guessed username: lewis<br />
2 different passwords attempted with this guessed username: alan<br />
2 different passwords attempted with this guessed username: aiden<br />
2 different passwords attempted with this guessed username: addison<br />
2 different passwords attempted with this guessed username: lvellman<br />
2 different passwords attempted with this guessed username: madison<br />
2 different passwords attempted with this guessed username: manger<br />
2 different passwords attempted with this guessed username: accountant<br />
2 different passwords attempted with this guessed username: mia<br />
2 different passwords attempted with this guessed username: abigail<br />
2 different passwords attempted with this guessed username: mason<br />
2 different passwords attempted with this guessed username: matthew<br />
2 different passwords attempted with this guessed username: adam<br />
2 different passwords attempted with this guessed username: angela<br />
2 different passwords attempted with this guessed username: andrew<br />
2 different passwords attempted with this guessed username: andrea<br />
2 different passwords attempted with this guessed username: liam<br />
2 different passwords attempted with this guessed username: anthony<br />
2 different passwords attempted with this guessed username: lillian<br />
2 different passwords attempted with this guessed username: logmeinremoteuser<br />
2 different passwords attempted with this guessed username: lori<br />
2 different passwords attempted with this guessed username: lucas<br />
2 different passwords attempted with this guessed username: amelia<br />
2 different passwords attempted with this guessed username: alexander<br />
2 different passwords attempted with this guessed username: logan<br />
2 different passwords attempted with this guessed username: joe<br />
2 different passwords attempted with this guessed username: cindy<br />
2 different passwords attempted with this guessed username: chris<br />
2 different passwords attempted with this guessed username: chloe<br />
2 different passwords attempted with this guessed username: CorpOwner<br />
2 different passwords attempted with this guessed username: evelyn<br />
2 different passwords attempted with this guessed username: consult<br />
2 different passwords attempted with this guessed username: front<br />
2 different passwords attempted with this guessed username: frontdesk<br />
2 different passwords attempted with this guessed username: gabriel<br />
2 different passwords attempted with this guessed username: checkout<br />
2 different passwords attempted with this guessed username: FranOwner<br />
2 different passwords attempted with this guessed username: checkin<br />
2 different passwords attempted with this guessed username: ethan<br />
2 different passwords attempted with this guessed username: elijah<br />
2 different passwords attempted with this guessed username: elizabeth<br />
2 different passwords attempted with this guessed username: ella<br />
2 different passwords attempted with this guessed username: doctor<br />
2 different passwords attempted with this guessed username: don<br />
2 different passwords attempted with this guessed username: donna<br />
2 different passwords attempted with this guessed username: dennis<br />
2 different passwords attempted with this guessed username: daniel<br />
2 different passwords attempted with this guessed username: cs13368<br />
2 different passwords attempted with this guessed username: emily<br />
2 different passwords attempted with this guessed username: emma<br />
2 different passwords attempted with this guessed username: eric<br />
2 different passwords attempted with this guessed username: general<br />
2 different passwords attempted with this guessed username: bruce<br />
2 different passwords attempted with this guessed username: jack<br />
2 different passwords attempted with this guessed username: jackson<br />
2 different passwords attempted with this guessed username: buexec<br />
2 different passwords attempted with this guessed username: isabella<br />
2 different passwords attempted with this guessed username: bruno<br />
2 different passwords attempted with this guessed username: bkupexec<br />
2 different passwords attempted with this guessed username: jerry<br />
2 different passwords attempted with this guessed username: jim<br />
2 different passwords attempted with this guessed username: brian<br />
2 different passwords attempted with this guessed username: jayden<br />
2 different passwords attempted with this guessed username: jeff<br />
2 different passwords attempted with this guessed username: intern<br />
2 different passwords attempted with this guessed username: harper<br />
2 different passwords attempted with this guessed username: charlie<br />
2 different passwords attempted with this guessed username: chad<br />
2 different passwords attempted with this guessed username: glenn<br />
2 different passwords attempted with this guessed username: charlotte<br />
2 different passwords attempted with this guessed username: grocery<br />
2 different passwords attempted with this guessed username: canon<br />
2 different passwords attempted with this guessed username: info<br />
2 different passwords attempted with this guessed username: install<br />
2 different passwords attempted with this guessed username: celerant<br />
2 different passwords attempted with this guessed username: henry<br />
2 different passwords attempted with this guessed username: carlos<br />
2 different passwords attempted with this guessed username: remote<br />
2 different passwords attempted with this guessed username: tim<br />
2 different passwords attempted with this guessed username: tom<br />
2 different passwords attempted with this guessed username: Ray<br />
2 different passwords attempted with this guessed username: robert<br />
2 different passwords attempted with this guessed username: roger<br />
2 different passwords attempted with this guessed username: RETAIL<br />
2 different passwords attempted with this guessed username: ricoh<br />
2 different passwords attempted with this guessed username: Post4<br />
2 different passwords attempted with this guessed username: Post7<br />
2 different passwords attempted with this guessed username: trish<br />
2 different passwords attempted with this guessed username: peter<br />
2 different passwords attempted with this guessed username: production<br />
2 different passwords attempted with this guessed username: tony<br />
2 different passwords attempted with this guessed username: toshiba<br />
2 different passwords attempted with this guessed username: tool<br />
2 different passwords attempted with this guessed username: sophia<br />
2 different passwords attempted with this guessed username: sqladmin<br />
2 different passwords attempted with this guessed username: Tech01<br />
2 different passwords attempted with this guessed username: sofia<br />
2 different passwords attempted with this guessed username: steve<br />
2 different passwords attempted with this guessed username: symantec<br />
2 different passwords attempted with this guessed username: stanley<br />
2 different passwords attempted with this guessed username: t1<br />
2 different passwords attempted with this guessed username: samuel<br />
2 different passwords attempted with this guessed username: scans<br />
2 different passwords attempted with this guessed username: terasoma<br />
2 different passwords attempted with this guessed username: temp<br />
2 different passwords attempted with this guessed username: Silverx<br />
2 different passwords attempted with this guessed username: skaner<br />
2 different passwords attempted with this guessed username: security<br />
2 different passwords attempted with this guessed username: shop<br />
2 different passwords attempted with this guessed username: operator<br />
2 different passwords attempted with this guessed username: olivia<br />
2 different passwords attempted with this guessed username: natalie<br />
2 different passwords attempted with this guessed username: zoey<br />
2 different passwords attempted with this guessed username: mike<br />
2 different passwords attempted with this guessed username: william<br />
2 different passwords attempted with this guessed username: ospite<br />
2 different passwords attempted with this guessed username: office<br />
2 different passwords attempted with this guessed username: veronica<br />
2 different passwords attempted with this guessed username: vismail<br />
2 different passwords attempted with this guessed username: victoria<br />
2 different passwords attempted with this guessed username: noah<br />
2 different passwords attempted with this guessed username: ncrm<br />
2 different passwords attempted with this guessed username: wand<br />
2 different passwords attempted with this guessed username: nss256wendys<br />
2 different passwords attempted with this guessed username: michael<br />
2 different passwords attempted with this guessed username: microssvc<br />
2 different passwords attempted with this guessed username: visitor<br />
2 different passwords attempted with this guessed username: xerox<br />
1 different passwords attempted with this guessed username: template<br />
1 different passwords attempted with this guessed username: cia<br />
1 different passwords attempted with this guessed username: cihan<br />
1 different passwords attempted with this guessed username: cayetano<br />
1 different passwords attempted with this guessed username: muhasebe<br />
1 different passwords attempted with this guessed username: bruno1234<br />
1 different passwords attempted with this guessed username: comercial<br />
1 different passwords attempted with this guessed username: susan<br />
1 different passwords attempted with this guessed username: vrfy<br />
1 different passwords attempted with this guessed username: camilie<br />
1 different passwords attempted with this guessed username: teresa<br />
1 different passwords attempted with this guessed username: telnet<br />
1 different passwords attempted with this guessed username: ted<br />
1 different passwords attempted with this guessed username: tape<br />
1 different passwords attempted with this guessed username: washington<br />
1 different passwords attempted with this guessed username: web<br />
1 different passwords attempted with this guessed username: taylor<br />
1 different passwords attempted with this guessed username: tcp<br />
1 different passwords attempted with this guessed username: tarragona<br />
1 different passwords attempted with this guessed username: tanya<br />
1 different passwords attempted with this guessed username: teds<br />
1 different passwords attempted with this guessed username: acct1<br />
1 different passwords attempted with this guessed username: t12010<br />
1 different passwords attempted with this guessed username: tammy<br />
1 different passwords attempted with this guessed username: www<br />
1 different passwords attempted with this guessed username: ceyda<br />
1 different passwords attempted with this guessed username: accounting<br />
1 different passwords attempted with this guessed username: training<br />
1 different passwords attempted with this guessed username: tracy<br />
1 different passwords attempted with this guessed username: travis<br />
1 different passwords attempted with this guessed username: transition<br />
1 different passwords attempted with this guessed username: vance<br />
1 different passwords attempted with this guessed username: tracey<br />
1 different passwords attempted with this guessed username: appservadmin<br />
1 different passwords attempted with this guessed username: appismo<br />
1 different passwords attempted with this guessed username: vanschoor<br />
1 different passwords attempted with this guessed username: trent<br />
1 different passwords attempted with this guessed username: user02<br />
1 different passwords attempted with this guessed username: tsadmin<br />
1 different passwords attempted with this guessed username: user8<br />
1 different passwords attempted with this guessed username: user7<br />
1 different passwords attempted with this guessed username: truck<br />
1 different passwords attempted with this guessed username: tricia<br />
1 different passwords attempted with this guessed username: uwe<br />
1 different passwords attempted with this guessed username: troisi<br />
1 different passwords attempted with this guessed username: uucp<br />
1 different passwords attempted with this guessed username: timc<br />
1 different passwords attempted with this guessed username: thomas<br />
1 different passwords attempted with this guessed username: timeclock<br />
1 different passwords attempted with this guessed username: beer<br />
1 different passwords attempted with this guessed username: therese<br />
1 different passwords attempted with this guessed username: term<br />
1 different passwords attempted with this guessed username: teri<br />
1 different passwords attempted with this guessed username: theresa<br />
1 different passwords attempted with this guessed username: texas<br />
1 different passwords attempted with this guessed username: backupexec<br />
1 different passwords attempted with this guessed username: vcs<br />
1 different passwords attempted with this guessed username: toni<br />
1 different passwords attempted with this guessed username: vargas<br />
1 different passwords attempted with this guessed username: tonya<br />
1 different passwords attempted with this guessed username: tommy<br />
1 different passwords attempted with this guessed username: timothy<br />
1 different passwords attempted with this guessed username: timeclock mails<br />
1 different passwords attempted with this guessed username: todd<br />
1 different passwords attempted with this guessed username: tina<br />
1 different passwords attempted with this guessed username: perl<br />
1 different passwords attempted with this guessed username: pentagon<br />
1 different passwords attempted with this guessed username: piotr<br />
1 different passwords attempted with this guessed username: Post2<br />
1 different passwords attempted with this guessed username: Post1<br />
1 different passwords attempted with this guessed username: paul1234<br />
1 different passwords attempted with this guessed username: kevin<br />
1 different passwords attempted with this guessed username: pcadmin<br />
1 different passwords attempted with this guessed username: karen<br />
1 different passwords attempted with this guessed username: pdf<br />
1 different passwords attempted with this guessed username: posuser<br />
1 different passwords attempted with this guessed username: postmaster<br />
1 different passwords attempted with this guessed username: prepress<br />
1 different passwords attempted with this guessed username: program<br />
1 different passwords attempted with this guessed username: IUSR_SERVER<br />
1 different passwords attempted with this guessed username: jimmy<br />
1 different passwords attempted with this guessed username: Post3<br />
1 different passwords attempted with this guessed username: Post5<br />
1 different passwords attempted with this guessed username: poste2<br />
1 different passwords attempted with this guessed username: Post8<br />
1 different passwords attempted with this guessed username: paul<br />
1 different passwords attempted with this guessed username: myhost<br />
1 different passwords attempted with this guessed username: nasa<br />
1 different passwords attempted with this guessed username: love<br />
1 different passwords attempted with this guessed username: neil<br />
1 different passwords attempted with this guessed username: micros1<br />
1 different passwords attempted with this guessed username: michelle<br />
1 different passwords attempted with this guessed username: miguel<br />
1 different passwords attempted with this guessed username: marco<br />
1 different passwords attempted with this guessed username: mode<br />
1 different passwords attempted with this guessed username: parking<br />
1 different passwords attempted with this guessed username: ospite1234<br />
1 different passwords attempted with this guessed username: patrizia<br />
1 different passwords attempted with this guessed username: kubik<br />
1 different passwords attempted with this guessed username: patrizia2<br />
1 different passwords attempted with this guessed username: lorenzo<br />
1 different passwords attempted with this guessed username: netsis<br />
1 different passwords attempted with this guessed username: network<br />
1 different passwords attempted with this guessed username: orders<br />
1 different passwords attempted with this guessed username: new<br />
1 different passwords attempted with this guessed username: publish<br />
1 different passwords attempted with this guessed username: socket<br />
1 different passwords attempted with this guessed username: SmokinPremiums<br />
1 different passwords attempted with this guessed username: solaris<br />
1 different passwords attempted with this guessed username: documents<br />
1 different passwords attempted with this guessed username: domain<br />
1 different passwords attempted with this guessed username: scan123<br />
1 different passwords attempted with this guessed username: expn<br />
1 different passwords attempted with this guessed username: evan<br />
1 different passwords attempted with this guessed username: silver<br />
1 different passwords attempted with this guessed username: esmtp<br />
1 different passwords attempted with this guessed username: station4<br />
1 different passwords attempted with this guessed username: cscadmin<br />
1 different passwords attempted with this guessed username: sue<br />
1 different passwords attempted with this guessed username: supervisor<br />
1 different passwords attempted with this guessed username: contract<br />
1 different passwords attempted with this guessed username: spiceworks<br />
1 different passwords attempted with this guessed username: soss<br />
1 different passwords attempted with this guessed username: daniela<br />
1 different passwords attempted with this guessed username: csi<br />
1 different passwords attempted with this guessed username: SQLAgentCmdExec<br />
1 different passwords attempted with this guessed username: salesman<br />
1 different passwords attempted with this guessed username: reguser<br />
1 different passwords attempted with this guessed username: rcpt<br />
1 different passwords attempted with this guessed username: relay<br />
1 different passwords attempted with this guessed username: guard<br />
1 different passwords attempted with this guessed username: halt<br />
1 different passwords attempted with this guessed username: qwerty<br />
1 different passwords attempted with this guessed username: query<br />
1 different passwords attempted with this guessed username: rad<br />
1 different passwords attempted with this guessed username: radiant<br />
1 different passwords attempted with this guessed username: IME_ADMIN<br />
1 different passwords attempted with this guessed username: rupert<br />
1 different passwords attempted with this guessed username: fuji1<br />
1 different passwords attempted with this guessed username: FPUPDENGUSR<br />
1 different passwords attempted with this guessed username: fbi<br />
1 different passwords attempted with this guessed username: sales2<br />
1 different passwords attempted with this guessed username: report<br />
1 different passwords attempted with this guessed username: renteria<br />
1 different passwords attempted with this guessed username: good<br />
1 different passwords attempted with this guessed username: gans<br />
1 different passwords attempted with this guessed username: Richard</p>
<p>The post <a href="https://fosterinstitute.com/anatomy-of-a-password-attack-and-how-to-prevent-them/">Anatomy of a Password Attack, and How to Prevent Them</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Password Managers Speed Your Workflow</title>
		<link>https://fosterinstitute.com/password-managers-speed-your-workflow/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 21 Apr 2022 21:59:14 +0000</pubDate>
				<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Email Security]]></category>
		<category><![CDATA[Family Security]]></category>
		<category><![CDATA[Mobile Security]]></category>
		<category><![CDATA[Password Security]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=5235</guid>

					<description><![CDATA[<p>Password managers make it quicker for you to log in to sites because they remember your passwords and can automatically log you into websites. Another advantage of a password manager is that it is simple for you to use different passwords for every website. If a bad actor ever discovers your password for one site, [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/password-managers-speed-your-workflow/">Password Managers Speed Your Workflow</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Password managers make it quicker for you to log in to sites because they remember your passwords and can automatically log you into websites.</p>
<p>Another advantage of a password manager is that it is simple for you to use different passwords for every website. If a bad actor ever discovers your password for one site, they can use a technique called credential stuffing to try the same password at other sites too. If you&#8217;ve reused the password, then the attacker will gain access.</p>
<p>Some password managers synchronize passwords between multiple devices, including phones and computers. Some password managers come with added features. Some people consider the added tools bloatware. If there is a feature you don&#8217;t need, see if there is an option not to install that feature. A password manager needs to use plugins for users&#8217; browsers, so that&#8217;s a given. Stuff like VPN offerings aren&#8217;t always beneficial, and sometimes installing additional programs creates &#8220;one more thing that might go wrong&#8221; or &#8220;one more program an attacker can attack&#8221; on the computer or phone.</p>
<p>Which password manager should you choose? You might already have a favorite. If not, consider asking your IT Professional for their input. If you use the one they like the best, you&#8217;ll know they&#8217;ll be able to help you if you have a question later. If a product forces you to install added software and you have no option to opt-out, consider a different password manager.</p>
<p>If you read reviews, many reviews weigh &#8220;free&#8221; heavily into their weighting. I know I&#8217;m willing to pay to get the best product and understand that companies need to make money to survive.</p>
<p>Of course, as always, I strongly encourage you to use some form of two-step verification in addition to the password. If the website provides the option to &#8220;Remember this device&#8221; so you don&#8217;t need to go through the second step as often, then logging in the second time should be almost seamless for you if you have a password manager.</p>
<p>What is the most significant risk of using a password manager? People immediately think of how attackers might break into the password manager to steal the passwords. With the modern technology to protect the password vault, it is more likely an attacker will steal your passwords out of your browser if you&#8217;ve told the browser to remember your passwords. To feel better, you might choose to memorize passwords for your bank and other sensitive passwords, but use your password manager for less risky logins. If you use a two-step login, you&#8217;re still protected by the second step even if an attacker discovers your password.</p>
<p>Perhaps the most significant risk of using a password manager is that attackers might somehow infect the company that writes the software and use the program to attack your computer. Attackers taking control of a widely used and trusted program is known as a supply chain attack and is what happened at Solar Winds, Log4j, CCleaner, and other high-profile breaches.</p>
<p>Passwords do not always stop attackers. They get into computers and wait for the user to enter the passwords for them: <a href="https://fosterinstitute.com/how-attackers-bypass-your-password-protection-even-if-you-use-two-step-login/" target="_blank" rel="noopener">https://fosterinstitute.com/how-attackers-bypass-your-password-protection-even-if-you-use-two-step-login/</a></p>
<p>Please forward this to your friends so they know a password manager can speed up their workflow.</p>
<p>The post <a href="https://fosterinstitute.com/password-managers-speed-your-workflow/">Password Managers Speed Your Workflow</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Watch for Threatening Email and Social Media Messages Saying You’re Hacked</title>
		<link>https://fosterinstitute.com/watch-for-threatening-email-messages-that-contain-your-actual-passwords/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 25 Mar 2022 09:58:00 +0000</pubDate>
				<category><![CDATA[Cloud Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Family Security]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[Password Security]]></category>
		<category><![CDATA[Ransomware]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2657</guid>

					<description><![CDATA[<p>Someone contacted me to explain that attackers hacked a family member&#8217;s Instagram account and threatened to expose some embarrassing photographs unless they paid the bad actor more than a thousand dollars. I told them: What he is experiencing is a common ploy. The bad actors probably didn’t hack his account, and I’m sure he reset [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/watch-for-threatening-email-messages-that-contain-your-actual-passwords/">Watch for Threatening Email and Social Media Messages Saying You’re Hacked</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Someone contacted me to explain that attackers hacked a family member&#8217;s Instagram account and threatened to expose some embarrassing photographs unless they paid the bad actor more than a thousand dollars. I told them:</p>
<p><span id="more-2657"></span>What he is experiencing is a common ploy. The bad actors probably didn’t hack his account, and I’m sure he reset his password just in case. The chances are that they don’t have any pictures. They certainly don’t have photos if whatever they claim happened didn’t happen.</p>
<p>The bullies are adept at social engineering, and their goal is to be terrifying. They’re incentivized because they make more money.</p>
<p>They commonly send information to make their messages look legitimate. They find passwords on the dark web and send those, where someone works, where they went to school, date of birth, and the names and ages of family members. That information is often easy to find, and bad actors having those details doesn’t mean they hacked an account. Often the entire information gathering process is automated. <a href="https://fosterinstitute.com/why-phishing-messages-contain-such-accurate-information/" target="_blank" rel="noopener">https://fosterinstitute.com/why-phishing-messages-contain-such-accurate-information/</a></p>
<p>The best thing is to avoid communicating with the bad actors and act like you never receive the messages. The bad actors will pick on someone else to try to get money from them.</p>
<p>I wouldn’t be surprised if he starts getting email messages from them.</p>
<p>Do this now: Be sure none of your email programs displays graphics or images when you open a message. On your iPhone or iPad, go to Settings &gt; Mail and turn off “Load Remote Images.” If you don&#8217;t see that option, look under Settings &gt; Mail &gt; Privacy Protection &gt; and choose &#8220;Block all Remote Content.&#8221; In Outlook, select File &gt; Options &gt; Trust Center &gt; Automatic Downloads and choose: Don&#8217;t download pictures automatically. Note that the setting can move around, but a quick search engine search for &#8220;how to block email tracking&#8221; and the name of your device or application will produce fast results. Take similar steps for every device you use to check your email. This step will usually prevent the attacker from knowing you opened the email message, but you must change the setting before receiving the message.</p>
<p>Cover up the cameras on your computers, tablets, and phones if you do not use the camera often.</p>
<p>If you do receive one of these messages, print it out and save it in case you need it for evidence in the future. Do not forward the message unless you are confident that the transmitted message contains no graphics.</p>
<p>It is up to you to decide if you want to warn family, friends, and everyone else in your address book in case the attacker follows through with their threat. Reassure your contacts that the contents of the message are false.</p>
<p>Make a detailed log, and make copies of all email messages, phone calls, and text messages you receive from them. Submit a complaint at <a href="http://ic3.gov" target="_blank" rel="noopener">ic3.gov</a>. Contact the police if you fear that your life is in danger. If the email message came from Gmail, notify Google, and they can investigate.</p>
<p>Visit <a href="http://www.haveibeenpwned.com" target="_blank" rel="noopener">www.haveibeenpwned.com</a> to see if there is evidence that your password has shown up posted on the dark web.</p>
<p>Reset sensitive passwords and enable two-step verification on websites where you log in. Be sure you are current on all security patches on your devices.</p>
<p>Please forward this to everyone you know so that they will prepare for threatening social media and email messages.</p>
<p>The post <a href="https://fosterinstitute.com/watch-for-threatening-email-messages-that-contain-your-actual-passwords/">Watch for Threatening Email and Social Media Messages Saying You’re Hacked</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
