Tags: two-factor authentication

online-pgp.jpg

online security
In this final installment of our PGP series, we show how to protect your online accounts with 2-factor authentication.

Protecting Code Integrity with PGP — Part 7: Protecting Online Accounts

So far in this tutorial series, we've provided practical guidelines for using PGP, including basic concepts and steps for generating and protecting your keys.  If you missed the previous articles, you can catch up below. In this final article, we offer additional guidance for protecting your online...
Read 0 Comments

How to Set Up Two-Factor Authentication in Linux

If you're a Linux administrator and looking to lock down your Linux servers and desktops as tight as possible, you owe it to yourself to make use of two-factor authentication. This should be considered as "no-brainer" as they come. Why? Because by adding two-factor authentication, it becomes...
Read 0 Comments

security-authentication.png

two-factor authentication
Strong, unique, randomly generated passwords are a critical requirement for every user. Here, we cover some best practices involving 2-factor authentication and password creation and use.

Best Practices for 2-Factor Authentication and Password Creation on Linux

As we mentioned in the previous article, web browsers present the largest and the most exposed attack surface on your Linux workstation. We’ve already discussed some best practices that Linux sysadmins can follow to reduce the impact of a compromised browser, such as upgrading to Wayland, using a...
Read 0 Comments

12 Days of Two-Factor Authentication: This Xmas, Give Yourself the Gift of Opsec

Enabling two-factor authentication—or 2FA for short—is among the easiest, most powerful steps you can take to protect your online accounts. Often, it’s as simple as a few clicks in your settings. However, different platforms sometimes call 2FA different things, making it hard to find: Facebook...
Read 0 Comments

SMS Two-Factor Authentication Is No Longer Enough

With the near-constant occurrence of highly organized and complex cybercrime attacks, effective digital authentication has never been more challenging. Businesses must verify who they’re transacting with by implementing additional security measures, but at the same time they need to minimize...
Read 0 Comments
Click Here!