Get rid of the root of all evil

Odds are you’ve been living under a rock if you don’t know what a password is in the 21st century, but the odds are much better that you’ve been using your passwords the wrong way.

For World Password Day this year, users around the world are realizing that improving your digital security is growing more and more important as important facets of our lives — banking, shopping, personal health, and more — are shifting online. From your digital wallet to social media, parts of our lives are lived online.

The door to your online life is the login screen, and…


Tips to protect your DMS data

Protecting information is everyone’s job, but it’s one that many people get frustrated with. Most of us have experienced the extra friction that comes with the many security processes we encounter when we handle data — whether for our own user accounts or as an employee managing sensitive business information.

Regardless, data protection is critical. There are policies all over the world that require companies to pay attention to information security requirements for user or employee data management in order to prevent breaches that could impact people’s lives and damage a business’ reputation. …


Microsoft Exchange zero-day vulnerabilities and we we could do
Microsoft Exchange zero-day vulnerabilities and we we could do
Microsoft Exchange zero-day vulnerabilities and we we could do

When I got an alert about Microsoft Exchange’s zero-day vulnerabilities CVE-2021–26855, 26857, 26858, and 26865, I immediately checked the logs of attempted access to our standard exchange servers’ ports. I usually find thousands of unsuccessful attempts to connect by various bots, port scanners, and similar players. I scanned these ports with well-known script http-vuln-exchange:


How to end uncontrolled account sharing and stop losing money
How to end uncontrolled account sharing and stop losing money
How to end uncontrolled account sharing and stop losing money

Netflix has had enough of your friend mooching off of your account. The streaming company is cutting down on account sharing by taking new steps to limit users outside of the account owner’s home from using the same account.

The new feature requires a form of two-factor authentication for potentially unauthorized users, making it more of a hassle to share your account. For those trying to log in to their friend’s account, they will be asked to get a verification email or text.

This effort aims to combat account sharing, with nearly one-third of users sharing their account with one…


Migrate from LastPass to PassHub in less than 5 minutes
Migrate from LastPass to PassHub in less than 5 minutes
Migrate from LastPass to PassHub in less than 5 minutes

LastPass is limiting its service to one type device for free users unless they upgrade to Premium starting March 16. Migrating from LastPass to PassHub.net is fast, easy and free. Switch now in less than 5 minutes.

To migrate your data from your LastPass account to PassHub.net, follow the four steps below:

  1. Create a Passhub.net account if you do not have one
  2. Export your LastPass records to a CSV file
  3. On the Passhub.net page, import the CSV file to the new safe
  4. Delete the CSV file on your computer

Export LastPass data

Open the LastPass extension popup and log into your account. Click…


Best practices: what to keep in mind buying encryption solutions
Best practices: what to keep in mind buying encryption solutions
Best practices: what to keep in mind buying encryption solutions

As tech has facilitated the rapid migration of value from the physical to the digital world, crime has followed the money online. In the resulting high-threat world we live in, cybercriminals and cybersecurity experts are in a high-stakes arms race. Attackers seek new ways to gain unauthorized access to data and information systems and defenders try to find new ways to prevent this. These strategies quickly become highly technical and highly nuanced. The devil is in the details, and for those lacking the deep technical knowledge, explanations can quickly become confusing.

Making things worse, cybersecurity vendors often employ marketing and…


If 2020 has taught us anything, battling a virus is not easy. It takes a range of methods to protect those around us, from staying inside to wearing masks. Even with this, COVID-19 feels like it’s everywhere.

In 2021, vaccines that have revolutionized disease control with cutting-edge mRNA approaches that have tackled the virus in an entirely new way. Scientists have finally found a way to beat COVID-19, but this year will be about the vaccine’s widespread distribution over former preventative measures.

With the revolutionary advancements made in virology, why don’t we take the same approach to cybersecurity?


Why your IT team needs to strengthen your password manager

Whether you’re a small business or a Fortune 500 multinational corporation, information security should always be a top priority. Just last year, billions of digital records containing personal information were stolen through data breaches, causing tens of millions of dollars in damages.

Today’s businesses rely on a wide variety of software systems to operate, and most are in the cloud. What’s more, most IT teams have to manage the access to those systems, not only for themselves, but for all employees, contractors, partners, etc. They also have to manage things like PKI certificates, database engines, network devices like access points…


How human-readable credentials cost your sales

With more than 40 percent of internet users in the U.S. stating they purchase items online several times per month, it’s clear the online shopping industry is booming. And, it’s only going to increase — making your business a goldmine of shopper info for cyber criminals everywhere.

With more and more transactions completed online, how do you protect your e-commerce site from being hacked and your customers’ data from being stolen?

Perhaps the most overlooked element of compliance is logging in. …


Social Media Privacy and Use and Abuse of Data

Many people are angry about Cambridge Analytica, and seek to blame Facebook for privacy and security issues which are common across many businesses operating online. It is understandable that politicians would be quick to jump on this bandwagon, piling on the blame. Today this culminated when some of the most powerful of our elected officials gathered in a public forum to spar off against one of the most powerful tech leaders in our world.

However, when we ask ourselves who is truly responsible, for most of us, we need only look in the mirror. The majority of us placed blind…

WWPass

Experts in multi-factor authentication and client-side encryption. Keeping businesses safe since 2008.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store