<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>two step login Archives - Foster Institute</title>
	<atom:link href="https://fosterinstitute.com/category/two-step-login/feed/" rel="self" type="application/rss+xml" />
	<link>https://fosterinstitute.com/category/two-step-login/</link>
	<description>Cybersecurity Experts</description>
	<lastBuildDate>Wed, 08 Apr 2020 16:50:45 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://fosterinstitute.com/wp-content/uploads/2021/02/Favicon.png</url>
	<title>two step login Archives - Foster Institute</title>
	<link>https://fosterinstitute.com/category/two-step-login/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Zoom Security &#8211; Set Up Two-Step Login</title>
		<link>https://fosterinstitute.com/zoom-security-set-up-two-step-login/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Wed, 08 Apr 2020 16:50:45 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[two step login]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Zoom]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/?p=3094</guid>

					<description><![CDATA[<p>Protect your Zoom account. If someone discovers your username and password for Zoom, two-step login should block them from logging in as you. This video walks you through setting up the two step login feature of Zoom. To help protect your Zoom meetings, watch other videos that cover concerns about using Zoom: Zoom Security Settings [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/zoom-security-set-up-two-step-login/">Zoom Security &#8211; Set Up Two-Step Login</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Protect your Zoom account. If someone discovers your username and password for Zoom, two-step login should block them from logging in as you.<span id="more-3094"></span></p>
<p><iframe src="https://player.vimeo.com/video/405338737?dnt=1&amp;app_id=122963" width="384" height="234" frameborder="0" allow="autoplay; fullscreen" allowfullscreen></iframe></p>
<p>This video walks you through setting up the two step login feature of Zoom.</p>
<p>To help protect your Zoom meetings, watch other videos that cover concerns about using Zoom:</p>
<p><a href="https://fosterinstitute.com/?p=3099&amp;preview=true" target="_blank" rel="noopener noreferrer">Zoom Security Settings &#8211; The Concise Details</a></p>
<p><a href="https://fosterinstitute.com/blog/zoom-security-issues-protect-yourself/" target="_blank" rel="noopener noreferrer">Zoom Security Issues &#8211; Protect Yourself</a></p>
<p><a href="https://fosterinstitute.com/blog/follow-along-to-set-zoom-security-settings/" target="_blank" rel="noopener noreferrer">Zoom Security &#8211; Follow Along to Set Settings</a></p>
<p>The post <a href="https://fosterinstitute.com/zoom-security-set-up-two-step-login/">Zoom Security &#8211; Set Up Two-Step Login</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A Way to Control Consultant Access – Every Time</title>
		<link>https://fosterinstitute.com/a-way-to-control-consultant-access-every-time/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Mon, 29 Aug 2016 16:21:24 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[IT Pro Tips]]></category>
		<category><![CDATA[IT Professionals]]></category>
		<category><![CDATA[IT Settings]]></category>
		<category><![CDATA[Technology Safety]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[two set logon]]></category>
		<category><![CDATA[two step login]]></category>
		<category><![CDATA[Consultant Security]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT Configuration]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pro tips]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[Preventative IT Maintenance Cyber]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[Security expert]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[two-step logon]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog/?p=2371</guid>

					<description><![CDATA[<p>What if you’d like to know each and every time a consultant attempted to access your systems? And would you like the ability to approve or deny each attempt? At a client’s office this week, one of the IT Professionals had an interesting idea. He can configure two-step logon to contact him, not the consultant, [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/a-way-to-control-consultant-access-every-time/">A Way to Control Consultant Access – Every Time</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>What if you’d like to know each and every time a consultant attempted to access your systems? And would you like the ability to approve or deny each attempt?<span id="more-2371"></span></p>
<p>At a client’s office this week, one of the IT Professionals had an interesting idea. He can configure two-step logon to contact him, not the consultant, for login verification.</p>
<p>If you configure this at your office, here is how it would work: First, the consultant would enter their username and password to login to your network. Then, an app on your smartphone would indicate that the outsourced consultant is trying to gain access.  Then, you will be able to choose to allow or deny the consultant’s login attempt.</p>
<p>This IT Professional wants to know, in real-time, when someone is attempting to log on to his network. If you use this arrangement, you will have the capability to permit them or deny them access each and every time.</p>
<p>It is an interesting idea.</p>
<p>The post <a href="https://fosterinstitute.com/a-way-to-control-consultant-access-every-time/">A Way to Control Consultant Access – Every Time</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Why is it not Google&#8217;s fault?</title>
		<link>https://fosterinstitute.com/why-is-it-not-googles-fault/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Thu, 12 May 2016 13:00:41 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Gmail]]></category>
		<category><![CDATA[Google]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Password Safety]]></category>
		<category><![CDATA[Password Security]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[two set logon]]></category>
		<category><![CDATA[two step login]]></category>
		<category><![CDATA[business IT security]]></category>
		<category><![CDATA[computer security]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[dark-web]]></category>
		<category><![CDATA[gmail]]></category>
		<category><![CDATA[google security]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[password safety]]></category>
		<category><![CDATA[password security]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[security blame]]></category>
		<category><![CDATA[stolen passwords]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[two factor auth]]></category>
		<category><![CDATA[two step verification]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=2316</guid>

					<description><![CDATA[<p>After last week&#8217;s post about the stolen Google and Gmail passwords, one of our valued subscribers wrote back asking why it isn&#8217;t Google&#8217;s fault that the passwords were stolen. I know &#8211; it would be so easy to blame Google. Those passwords were gathered from other “stolen password repositories” posted on the dark-web. They were [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/why-is-it-not-googles-fault/">Why is it not Google&#8217;s fault?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>After last week&#8217;s post about the stolen Google and Gmail passwords, one of our valued subscribers wrote back asking why it isn&#8217;t Google&#8217;s fault that the passwords were stolen. <span id="more-2316"></span></p>
<p>I know &#8211; it would be so easy to blame Google. Those passwords were gathered from other “stolen password repositories” posted on the dark-web. They were originally acquired through key-loggers, social engineering, brute-force attacks, and a myriad of other ways. None of them, so far as anyone can tell, were stolen by bypassing any security on Google’s systems.</p>
<p>Once upon a time, imagine a situation where a company called Eulcon Inc. buys a lock from a company named Good-Lock. If an employee at Eulcon Inc. loses the key, and an attacker finds the key, and the attacker breaks into Eulcon, should they blame Good-Lock for the intrusion?</p>
<p>Here is what would be much more secure. What if, every time someone turned the key in the lock at Eulcon, the lock wouldn&#8217;t open yet. First, someone at Good-Lock would phone the person at Eulcon to whom the key is registered, in order to verify that they are the person who turned the key. The lock would only open for an authorized person. Potential intruders stay locked out. </p>
<p>This is why it is so important that all organizations set up two step login everywhere possible. Two factor auth dot org provides a list of services that support two step login. Additionally, VPNs, Windows, and other services support two step login. Configure two step login, or pay the consequences. And don&#8217;t blame Good-Lock. And don&#8217;t be like Eulcon spelled backwards.</p>
<p>Please forward this cyber-security info to everyone you care about.</p>
<p>The post <a href="https://fosterinstitute.com/why-is-it-not-googles-fault/">Why is it not Google&#8217;s fault?</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Gmail Passwords Stolen, Possibly Millions of Them</title>
		<link>https://fosterinstitute.com/gmail-passwords-stolen-possibly-millions-of-them/</link>
		
		<dc:creator><![CDATA[Mike Foster]]></dc:creator>
		<pubDate>Fri, 06 May 2016 13:00:32 +0000</pubDate>
				<category><![CDATA[Alerts]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber Security Breach]]></category>
		<category><![CDATA[Gmail]]></category>
		<category><![CDATA[IT Best Practices]]></category>
		<category><![CDATA[Password Safety]]></category>
		<category><![CDATA[Password Security]]></category>
		<category><![CDATA[Technology Safety Tips]]></category>
		<category><![CDATA[two step login]]></category>
		<category><![CDATA[added security password security]]></category>
		<category><![CDATA[business IT security]]></category>
		<category><![CDATA[computer security]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Security Best Practices]]></category>
		<category><![CDATA[Cyber Security Consultant]]></category>
		<category><![CDATA[cyber security expert]]></category>
		<category><![CDATA[Cyber Security Tips]]></category>
		<category><![CDATA[gmail security]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[Internet Safety Tips]]></category>
		<category><![CDATA[it best practices]]></category>
		<category><![CDATA[IT network security]]></category>
		<category><![CDATA[IT pros]]></category>
		<category><![CDATA[it risk management]]></category>
		<category><![CDATA[it security audit]]></category>
		<category><![CDATA[IT security consultant]]></category>
		<category><![CDATA[it security expert]]></category>
		<category><![CDATA[IT security procedures]]></category>
		<category><![CDATA[it security review]]></category>
		<category><![CDATA[IT security training]]></category>
		<category><![CDATA[password safety]]></category>
		<category><![CDATA[risk management]]></category>
		<category><![CDATA[security breach]]></category>
		<category><![CDATA[tech support]]></category>
		<category><![CDATA[two factor auth]]></category>
		<category><![CDATA[two step verification]]></category>
		<guid isPermaLink="false">https://fosterinstitute.com/blog//?p=2314</guid>

					<description><![CDATA[<p>This applies to everyone, not just Gmail users. A researcher at Hold Security bought 272 million stolen passwords on the dark web. Some of the credentials were for Gmail. This is not Google’s fault. Whether you use Gmail or not, everyone, if they haven’t already, needs to enable two step login. Then it is very [&#8230;]</p>
<p>The post <a href="https://fosterinstitute.com/gmail-passwords-stolen-possibly-millions-of-them/">Gmail Passwords Stolen, Possibly Millions of Them</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>This applies to everyone, not just Gmail users. A researcher at Hold Security bought 272 million stolen passwords on the dark web. Some of the credentials were for Gmail. This is not Google’s fault. Whether you use Gmail or not, everyone, if they haven’t already, needs to enable <span id="more-2314"></span>two step login. Then it is very unlikely that an attacker can compromise your account,  even if they discover your username and password.</p>
<p>Visit two factor auth dot org (no spaces) for a list of services that already permit you to choose two step login. Each site will walk you through the process.</p>
<p>Google calls their service 2 step verification. Google that phrase to find instructions on Google’s site.</p>
<p>Forward this to everyone who you care about so that they can be more cyber-secure too.</p>
<p>The post <a href="https://fosterinstitute.com/gmail-passwords-stolen-possibly-millions-of-them/">Gmail Passwords Stolen, Possibly Millions of Them</a> appeared first on <a href="https://fosterinstitute.com">Foster Institute</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
