Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

10/4/2016
01:10 PM
Steve Zurier
Steve Zurier
Slideshows
Connect Directly
Twitter
RSS
E-Mail
50%
50%

5 Ways To Lock Down Your Login

New public awareness campaign inspired by the White House calls for users to think more carefully about stronger authentication.
Previous
1 of 6
Next

Image Source: National Cyber Security Alliance

Image Source: National Cyber Security Alliance

 

There’s a creeping sense that the hackers are winning. That there’s not much average people can do to stop them. That we’re all just hapless victims and just have to get used to having our privacy and sensitive accounts breached. We’re in the so-called new normal.

It’s just not true. While software makers and company security departments have a role to play, there’s a lot average users can do to protect themselves that are inexpensive and fairly convenient.

A new campaign called for in President Obama’s Cybersecurity National Action Plan earlier this year has the National Cyber Security Alliance (NCSA) working with more than 35 companies and NGOs to empower Americans to use two-factor authentication for their online accounts.

Michael Kaiser, NCSA’s executive director, pointed out that an NCSA survey found 72 percent of Americans believe their accounts are secure with just usernames and passwords.

“Usernames and passwords simply are not enough,” Kaiser said. “Hackers and cybercriminals continue to evolve their attack techniques and users must improve their security to better protect their accounts.”

The initiative, Lock Down Your Login, was formally announced last week. It educates users on how to set stronger passwords and manage them better, as well as use two-factor authentication technologies such as hardware tokens, biometrics, and one-time codes.

Two-factor authentication delivers a second layer of security beyond a simple username and password and can discourage hackers from infiltrating people’s credit card and online banking accounts. Companies and government agencies have used two-factor authentication for several years in business settings, but the NCSA campaign seeks to enhance awareness among the general public.

“Taking these added security measures will take up a person’s time, but all I can say it’s better for a person to take 40 minutes or so to learn and deploy two-factor authentication, because they will be spending far more time to recover from a breach,” said James Stanger, senior director of product development for CompTIA, an educational group that offers security training.

In interviews with Kaiser and Stanger and to kick off National Cyber Security Awareness Month, Dark Reading developed the following five slides to help people better understand the two-factor authentication options open to them. Nobody will use all these methods, but if everyone does at least one added measure they can at least feel that there’s something tangible and effective they can do to protect themselves. 

 

Steve Zurier has more than 30 years of journalism and publishing experience and has covered networking, security, and IT as a writer and editor since 1992. Steve is based in Columbia, Md. View Full Bio
 

Recommended Reading:

Previous
1 of 6
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
Cyberattacks Are Tailored to Employees ... Why Isn't Security Training?
Tim Sadler, CEO and co-founder of Tessian,  6/17/2021
Edge-DRsplash-10-edge-articles
7 Powerful Cybersecurity Skills the Energy Sector Needs Most
Pam Baker, Contributing Writer,  6/22/2021
News
Microsoft Disrupts Large-Scale BEC Campaign Across Web Services
Kelly Sheridan, Staff Editor, Dark Reading,  6/15/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-32823
PUBLISHED: 2021-06-24
In the bindata RubyGem before version 2.4.10 there is a potential denial-of-service vulnerability. In affected versions it is very slow for certain classes in BinData to be created. For example BinData::Bit100000, BinData::Bit100001, BinData::Bit100002, BinData::Bit<N>. In combination with &lt...
CVE-2021-35041
PUBLISHED: 2021-06-24
The blockchain node in FISCO-BCOS V2.7.2 may have a bug when dealing with unformatted packet and lead to a crash. A malicious node can send a packet continuously. The packet is in an incorrect format and cannot be decoded by the node correctly. As a result, the node may consume the memory sustainabl...
CVE-2021-2322
PUBLISHED: 2021-06-23
Vulnerability in OpenGrok (component: Web App). Versions that are affected are 1.6.7 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via HTTPS to compromise OpenGrok. Successful attacks of this vulnerability can result in takeover of OpenGrok. CVSS 3.1 ...
CVE-2021-20019
PUBLISHED: 2021-06-23
A vulnerability in SonicOS where the HTTP server response leaks partial memory by sending a crafted HTTP request, this can potentially lead to an internal sensitive data disclosure vulnerability.
CVE-2021-21809
PUBLISHED: 2021-06-23
A command execution vulnerability exists in the default legacy spellchecker plugin in Moodle 3.10. A specially crafted series of HTTP requests can lead to command execution. An attacker must have administrator privileges to exploit this vulnerabilities.