by UpTime Development | Jul 21, 2017 | Managed Security
This prompted me to re-review Yubikey and U2F authentication. The key (sorry) advantages of a U2F key, like Yubikey, are that it saves you typing and does not require your phone, it is a bit easier to carry, and it can’t be fooled by bogus websites. There are a few...
by UpTime Development | Jul 21, 2017 | Managed Security
Over 400,000 phishing sites were observed each month during 2016. Of those observed sites, 84% existed for less than 24 hours, with an average life cycle of under 15 hours. Some sites can last for as little as 15 minutes. The data was collected by Webroot and...
by UpTime Development | Jul 21, 2017 | Managed IT, Managed Security
Gartner Group predicts that the use of Ethernet fabrics, SDN, SD-WAN and cloud-managed networks, will replace more than 50% of the installed Internet access base by 2020. Due to higher access speeds and to the growing use of network management systems (Juniper’s...
by UpTime Development | Jul 18, 2017 | Managed IT, Managed Security
In the example about the Five Stages of Data Breach Grief, Troy Hunt put a link to a good example of a public apology by the Australian Red Cross after a data breach they had last year. Watching the AU Red Cross apology made me wonder what makes a good public...
by UpTime Development | Jul 18, 2017 | Managed Security
Last week the big hullabaloo was that the UK Automobile Association was practicing to be the poster child for how NOT to handle a data breach. This week, they are turning themselves around with a public apology. You can read the AA’s apology on Graham Cluley’s (the...
by UpTime Development | Jul 11, 2017 | Managed Security
My workmate Eric alerted me to something he found on a product called the Yubikey, a U2F device that you plug into your laptop/workstation to act as a second factor proof that you are who you are. I had looked at Yubikey a few years ago, but felt that they were not...