As I prefere to use services for all kind of users I decided to buy a comercial USB Drive on Walmart and use the brand software for encryption. It was very easy to install and use because the user interface, it ask me for a "secure" password +8digit, special character, lower and upper case, numbers. After the encryption my drive has and special "folder" when I can store files and access them by the interface. It has the application portable so I can access them on any Windows/MacOS device.
Physicians, attorneys and other professionals whose job duties affect others' lives usually receive, as part of their formal training, courses that address ethical issues common to their professions. IT security personnel often have access to confidential data and knowledge about individuals' and companies' networks and systems that give them a great deal of power. That power can be abused, either deliberately or inadvertently. But there are no standardized training requirements for hanging out your shingle as an IT security consultant or in-house security specialist. Associations and organizations for IT pros are beginning to address the ethical side of the job, but again, there is no requirement for IT security personnel to belong to those organizations. Why are ethical guidelines needed? The education and training of IT professionals, including security specialists, usually focuses on technical knowledge and skills. You learn how to perform tasks, but with little ...
After the last class TC2027 on Monday 14 and Ken's suggestion of using an "strong" password I was trying to figure what is the matter with our "regular" password when we activate a 2FA like an SMS, phone call or Google Authentication App. So I research about it and made this small post about it. What I found was many examples about how 2FA and MFA resides on really normal transactions like credit cards, banks and doors, to say that we are using 2FA we should have 2 of: something you know something you have something you are Witch basically is adding security layers to the standard "something you know" user and password, based on that is easy to resolve my questions; 2 layers are better than just 1 and stronger layers improve security even further. Other point I found is that there is a problem on the recovery passwords features because normally this process avoid the use of 2FA so many services have implemente...
Comentarios
Publicar un comentario