Going Phishing?

Going Phishing?

Here are The Most Common Email Subject Lines to Be Wary Of

Typically, subject lines that seem to trigger attention from an employee and/or require a quick response are associated with completing a task, are personally significant to them or pose some sort of security threat the employee feels he/she should be on the lookout for.

How to set up Two Factor Authentication for iCloud

Two Factor Authentication for iCloud
To begin, open up System Preferences | iCloud. In the resulting window, click Account Details and (when prompted) enter the password for your Apple account (not the password for your macOS device). Click the Security tab and then click Turn On Two-Factor Authentication (Figure A).

Figure A

Enabling two-factor authentication.

How to set up Two Factor Authentication for Office 365

Set up multi-factor authentication in the Office 365 admin center

Go to the Office 365 admin center.
Navigate to Users> Active users.
In the Office 365 admin center, click More> Setup Azure multi-factor auth.
Find the user or users who you want to enable for MFA. In order to see all the users,you might need to change the Multi-Factor Auth statusview at the top.

How to set up Two factor Authentication

What is Two-Factor Authentication?

Two-step authentication is the most prevalent way to secure your accounts: It asks you to authenticate that you are who you say you are by supplying not only your password, but a unique code supplied from your phone or an external app.

How to Create a Strong Password

Passwords have evolved a lot over the years, from the legendary “open sesame” to a secret knock with “Lenny sent me” to get you into a private poker game. But one thing has not changed, it is what gives you access, that’s why passwords have always been coveted, from the combination to a safe to access to an online bank account, the so called “easy money”. As such the password has evolved over time to be longer and contain numbers and symbols, and through the years the minimum password length has grown in direct relation to the increase in compute power that became available to hack a password.