Don’t get too excited. What we are talking about is that “I love you” is one of the top 20 passwords on the Dark Web. These are the passwords that have been found most often in data breaches that are for sale on the Dark Web. Clearly, we have work to do in our security training when we tell our users to change their passwords to something difficult to guess and they make it one of there. (It can be frustrating to be a cyber security-vangelist.)
READ MORE>>>
CYBER NEWS
Toyota suspends domestic factory operations after suspected cyber attack
Toyota suspends domestic factory operations after suspected cyber attack
Toyota Motor Corp said it will suspend domestic factory operations on Tuesday, losing around 13,000 cars of output, after a supplier of plastic parts and electronic components was hit by a suspected cyber attack.
www.reuters.com • Share
Recorded Future: Russia may retaliate with cyber attacks
Recorded Future: Russia may retaliate with cyber attacks
Recorded Future analysts discussed potential threats and possible retaliatory cyber attacks from Russia following its invasion of Ukraine.
www.techtarget.com • Share
Unusual sign-in activity mail goes phishing for Microsoft account holders
Unusual sign-in activity mail goes phishing for Microsoft account holders
We look at a phishing mail which may cause concern for users of Microsoft services as it claims there’s been a suspicious login from Russia.
blog.malwarebytes.com • Share
TIP OF THE WEEK
Multi-Factor Authentication
A reminder of the importance of using multi-factor authentication (MFA)
- MFA requires an additional step for accessing accounts besides just a username and password. If someone gains access to your username and password, it won’t be enough if you have MFA activated.
- It is an extra step that may provide enough resistance to stop come cyber criminals from accessing your systems. If they can get into another system quicker, one that doesn’t require MFA, they’ll move on to that one.
- MFA can be achieved with text, an authenticator app, email, or another method that provides a separate code for you to enter to complete the authentication process
- It is an essential part of a zero-trust model of security (ensuring authentication for any and all access points within your network)
VOCABULARY WORD
Data Compromise: Potential, actual, or threatened access to sensitive or protected information by unauthorized individuals.
CYBER HUMOR