![]() ![]() More and more corporate networks and public services support 2FA schemes. I’m also a big believer in two-factor authentication (2FA). The biggest defense in this category is to get rid of all your permanent members of elevated groups. I’ve covered this many times before in previous articles it can be done. That means making it significantly harder for bad people and malware to access the highest-privileged accounts on the systems that host credential databases. The real answer, however, is that host providers need to do a much better job of preventing credential databases from being stolen. ![]() These services suffer the same accuracy problems as antivirus scanning software, but something always is better than nothing. In addition, a host of services will throw up an alert if you (or an end-user) heads toward a known phishing site. Many browsers come with antiphishing tools at a bare minimum, use them. ![]() Preventing phishing attacks means better end-user education - I’m a big believer in phishing your own users to teach them a lesson - and the use of multiple antiphishing tools. Here are the top two defenses that address the main causes: phishing attacks and credential database theft. This is not to say that you should throw up your hands and give up. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |