<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Multi-Factor Authentication Archives - L2 Cyber Security Solutions</title>
	<atom:link href="https://www.l2cybersecurity.com/tag/multi-factor-authentication/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/tag/multi-factor-authentication/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Thu, 01 Aug 2024 15:14:27 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>Multi-Factor Authentication Archives - L2 Cyber Security Solutions</title>
	<link>https://www.l2cybersecurity.com/tag/multi-factor-authentication/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>#WeekendWisdom 090 Poor Passwords and MFA</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-090-poor-passwords-and-mfa/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 06 Aug 2021 07:15:36 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[2FA]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[MFA]]></category>
		<category><![CDATA[Multi-Factor Authentication]]></category>
		<category><![CDATA[Password]]></category>
		<category><![CDATA[Password Manager]]></category>
		<category><![CDATA[Passwords]]></category>
		<category><![CDATA[Poor Passwords]]></category>
		<category><![CDATA[Poor Passwords and MFA]]></category>
		<category><![CDATA[Tipperary]]></category>
		<category><![CDATA[Two-Factor-Authentication]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2583</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 90. This week we&#8217;re going to talk about poor passwords and MFA. Where is this coming from? I met somebody earlier this week who had been in one of my training sessions earlier this year. They had been going on about the changes they had made as result of that training&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-090-poor-passwords-and-mfa/">#WeekendWisdom 090 Poor Passwords and MFA</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 90. This week we&#8217;re going to talk about poor passwords and MFA.<span id="more-2583"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2583-1" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/08/WeekendWisdom-090-lo.mp4?_=1" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/08/WeekendWisdom-090-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/08/WeekendWisdom-090-lo.mp4</a></video></div>
<h3>Where is this coming from?</h3>
<p>I met somebody earlier this week who had been in one of my training sessions earlier this year. They had been going on about the changes they had made as result of that training course. The main one he was delighted with was the use of an authenticator app for multi-factor authentication or two factor authentication.</p>
<p>He had put this on, on many of his accounts and he was delighted with it. Because when he had checked his email addresses on www.HaveIBeenPwned.com he found that he had been in a number of data breaches and that his passwords had been exposed in those data breaches. So he made absolutely certain put on multi-factor authentication on those accounts.</p>
<h3>That sounds like a good course of action</h3>
<p>Then I asked him &#8220;and you changed your passwords. Right?&#8221;</p>
<p>He said &#8220;No. No. I can never remember &#8230; I always forget my passwords when I change them. So I use the same password all the time. But now the accounts are fully protected sure with the MFA.&#8221;</p>
<h3>What is wrong with that?</h3>
<p>But I was explaining to him that if he continued to use the same password, that has been included in a data breach, then this is going to be in the public domain and criminals are going to be using that password to try and break into any other accounts that he might have, that he might not have protected with MFA.</p>
<h3>So poor passwords and MFA is not a good idea</h3>
<p>So really he needed to go and make an investment and get himself a password manager and I reiterated that and I will always keep saying you should use a password manager to generate unique long strong passwords for every single account that you have online. Let the password manager remember them. That&#8217;s it&#8217;s job.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<div class="fl-post-content clearfix">
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://www.linkedin.com/in/l2actual/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://infosec.exchange/@L2actual" target="_blank" rel="noopener">Mastodon</a>.</p>
<p>Follow L2 Cyber on <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-090-poor-passwords-and-mfa/">#WeekendWisdom 090 Poor Passwords and MFA</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/08/WeekendWisdom-090-lo.mp4" length="34493011" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 087 WhatsApp Number Recycling</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-087-whatsapp-number-recycling/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 16 Jul 2021 01:15:22 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Multi-Factor Authentication]]></category>
		<category><![CDATA[Number Recycling]]></category>
		<category><![CDATA[Number Reuse]]></category>
		<category><![CDATA[Recovery Email]]></category>
		<category><![CDATA[Tipperary]]></category>
		<category><![CDATA[Two-Factor-Authentication]]></category>
		<category><![CDATA[Whatsapp]]></category>
		<category><![CDATA[WhatsApp Authentication]]></category>
		<category><![CDATA[WhatsApp Number Recycling]]></category>
		<category><![CDATA[WhatsApp Number Reuse]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2568</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 87. This week we&#8217;re going to talk about WhatsApp number recycling. Recycling is good for the environment, isn&#8217;t it? Earlier this week I was in doing a quarterly health check for one of my clients and I went up to one of the new members of staff. She was showing me&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-087-whatsapp-number-recycling/">#WeekendWisdom 087 WhatsApp Number Recycling</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 87. This week we&#8217;re going to talk about WhatsApp number recycling.<span id="more-2568"></span></p>
<div style="width: 1920px;" class="wp-video"><video class="wp-video-shortcode" id="video-2568-2" width="1920" height="1080" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2021/07/WeekendWisdom-087-lo.mp4?_=2" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2021/07/WeekendWisdom-087-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2021/07/WeekendWisdom-087-lo.mp4</a></video></div>
<h3>Recycling is good for the environment, isn&#8217;t it?</h3>
<p>Earlier this week I was in doing a quarterly health check for one of my clients and I went up to one of the new members of staff. She was showing me her new phone that she had just gotten with the new number for the business. She had just set up WhatsApp and she was getting these strange messages coming into her and she was wondering how these were happening.</p>
<p>What it looks like is that the phone company they&#8217;re signed up with have reused or recycled a previous mobile number that had been assigned to somebody else.</p>
<h3>How does WhatsApp Number Recycling occur?</h3>
<p>Now if you think about it with WhatsApp when you set up an account all you need to authenticate is your mobile number. So in this case somebody had previously had that mobile number that this new member of staff has got now, people who were sending messages to her old number, to that other person&#8217;s number maybe in WhatsApp groups or whatever, they&#8217;re now going to this new phone that this member of staff has.</p>
<h3>How do you protect against this?</h3>
<p>The first thing I told her that she should do to protect her account is to setup the two factor authentication and there is also a recovery email option in there as well. So if you do find you&#8217;re getting strange messages on a new account or new number then that&#8217;s probably what&#8217;s happening.</p>
<h3>Is this something new?</h3>
<p>This has been going on for quite some time because I actually wrote this back in January 2019 and I have a link to the <a href="https://www.l2cybersecurity.com/whatsapp-authentication-sucks/" target="_blank" rel="noopener">blog post I wrote about it back then</a>. But this is now happening or seems to be happening here now in Ireland.</p>
<p>So that’s it for this week. Lets be careful out there and we’ll talk to you again next week.</p>
<div class="fl-post-content clearfix">
<hr />
<h2>How can L2 Cyber Security help you?</h2>
<p>We offer a full range of <a href="https://www.l2cybersecurity.com/training" target="_blank" rel="noopener noreferrer">training programmes</a>, which can be delivered online or in-person<strong>*</strong>.</p>
<p>L2 Cyber Security are also a partner of <a href="https://www.cyberriskaware.com/" target="_blank" rel="noopener noreferrer">CyberRiskAware</a> for online self-directed Cyber Security Awareness training and Phishing testing.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com" target="_blank" rel="noopener noreferrer">info@L2CyberSecurity.com</a>.</p>
<p><strong>*</strong>With appropriate social distancing and other health and safety measures adhered to.</p>
<hr />
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://twitter.com/L2actual" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2actual/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">© L2 Cyber Security Solutions</a></p>
</div>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-087-whatsapp-number-recycling/">#WeekendWisdom 087 WhatsApp Number Recycling</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2021/07/WeekendWisdom-087-lo.mp4" length="33153128" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 027 Password Spraying</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-027-password-spraying/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 08 May 2020 11:06:32 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Med Tech]]></category>
		<category><![CDATA[Medical Research]]></category>
		<category><![CDATA[Multi-Factor Authentication]]></category>
		<category><![CDATA[Nation-State Hackers]]></category>
		<category><![CDATA[Password Manager]]></category>
		<category><![CDATA[Password Spraying]]></category>
		<category><![CDATA[Pharmaceutical]]></category>
		<category><![CDATA[Tipperary]]></category>
		<category><![CDATA[Two-Factor-Authentication]]></category>
		<category><![CDATA[Universities]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1975</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 27. This week we&#8217;re going to talk about password spraying. What is going on right now? Just earlier this week, US and UK cyber security authorities released an update on what the activity they are seeing online at the moment. And what they&#8217;ve seen is nation-state hacking groups or groups that&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-027-password-spraying/">#WeekendWisdom 027 Password Spraying</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 27. This week we&#8217;re going to talk about password spraying.<span id="more-1975"></span></p>
<div style="width: 1280px;" class="wp-video"><video class="wp-video-shortcode" id="video-1975-3" width="1280" height="720" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2020/05/WeekendWisdom-027-lo.mp4?_=3" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2020/05/WeekendWisdom-027-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2020/05/WeekendWisdom-027-lo.mp4</a></video></div>
<h3>What is going on right now?</h3>
<p>Just earlier this week, US and UK cyber security authorities released an update on what the activity they are seeing online at the moment. And what they&#8217;ve seen is nation-state hacking groups or groups that are aligned with nation states appear to be targeting medical research companies, pharmaceutical companies, national health organisations and government departments. They do this to try and get some intelligence or some insider information from those, for their own benefits.</p>
<h3>How does Password Spraying work?</h3>
<p>What they are doing is they&#8217;re researching companies getting lists of names of people who are working there and then generating potential user IDs from those names. And then they&#8217;re doing what is called password spraying. This is where they then take those user IDs and put them in combination with some very commonly used passwords like &#8220;123456&#8221;, &#8220;qwerty&#8221; or &#8220;password1&#8221;.</p>
<p>They try to see if they can get a log on into the systems with those user IDs and passwords. So they spray this across as many as they can. And if they were successful in getting in, then they will try and get the information they&#8217;re looking for.</p>
<h3>How do we protect ourselves from that?</h3>
<p>So you can protect yourself by using things like a password manager to make complicated passwords and two factor authentication to prevent people from breaking in with just user IDs and passwords. I covered these off in <a href="https://www.l2cybersecurity.com/weekendwisdom-016-password-best-practices/" target="_blank" rel="noopener noreferrer">#WeekendWisdom 016</a> and <a href="https://www.l2cybersecurity.com/weekendwisdom-017-multi-factor-authentication/" target="_blank" rel="noopener noreferrer">#WeekendWisdom 017</a>.</p>
<p>So that&#8217;s it for this week. Lets be careful out there and we&#8217;ll talk to you again next week.</p>
<h3>Follow us on Social media:</h3>
<p>Liam is available on <a href="https://twitter.com/L2_Evangelist" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/in/lynchliam/" target="_blank" rel="noopener noreferrer">LinkedIn</a> and <a href="https://www.instagram.com/l2_evangelist/" target="_blank" rel="noopener noreferrer">Instagram</a>.</p>
<p>Follow L2 Cyber on <a href="https://twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">Twitter</a>, <a href="https://www.linkedin.com/company/l2cyber/" target="_blank" rel="noopener noreferrer">LinkedIn</a>, <a href="https://www.instagram.com/l2cyber/" target="_blank" rel="noopener noreferrer">Instagram</a> and <a href="https://www.facebook.com/L2Cyber/" target="_blank" rel="noopener noreferrer">Facebook</a>.</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-027-password-spraying/">#WeekendWisdom 027 Password Spraying</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2020/05/WeekendWisdom-027-lo.mp4" length="21698666" type="video/mp4" />

			</item>
		<item>
		<title>#WeekendWisdom 017 Multi-Factor Authentication</title>
		<link>https://www.l2cybersecurity.com/weekendwisdom-017-multi-factor-authentication/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 28 Feb 2020 09:49:12 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[#WeekendWisdom]]></category>
		<category><![CDATA[2 Factor Authentication]]></category>
		<category><![CDATA[2FA]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[MFA]]></category>
		<category><![CDATA[Multi-Factor Authentication]]></category>
		<category><![CDATA[Tipperary]]></category>
		<category><![CDATA[Two-Factor-Authentication]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1848</guid>

					<description><![CDATA[<p>Welcome to #WeekendWisdom number 17. This week we&#8217;re going to talk about multi-factor authentication. Before we get into multi-factor, let&#8217;s talk about single-factor. What is that? What is Single-Factor Authentication When you go to sign into some application or your email or LinkedIn, you type in your user ID and password and you get in.&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-017-multi-factor-authentication/">#WeekendWisdom 017 Multi-Factor Authentication</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Welcome to #WeekendWisdom number 17. This week we&#8217;re going to talk about multi-factor authentication.<span id="more-1848"></span></p>
<div style="width: 1280px;" class="wp-video"><video class="wp-video-shortcode" id="video-1848-4" width="1280" height="720" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2020/02/WeekendWisdom-017-lo.mp4?_=4" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2020/02/WeekendWisdom-017-lo.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2020/02/WeekendWisdom-017-lo.mp4</a></video></div>
<p>Before we get into multi-factor, let&#8217;s talk about single-factor. What is that?</p>
<h3>What is Single-Factor Authentication</h3>
<p>When you go to sign into some application or your email or LinkedIn, you type in your user ID and password and you get in. That is a single factor authentication. Your password is the one and only factor that&#8217;s used. So if the bad guys get your password by some nefarious means, by looking over your shoulder or compromising your password in some other way, once they have that, they are able to sign in as you.</p>
<h3>What is Multi-Factor Authentication</h3>
<p>But with multi-factor, you&#8217;re adding a second or another factor to authenticate you and prevent the bad guys from getting in. So we&#8217;ll cover off three types:</p>
<h4>1 &#8211; SMS Text Message</h4>
<p>The first type is using an SMS text message. So in this situation, you type in your user ID and password and you&#8217;ll get the service or application that you&#8217;re signing into to send you a text message with a six-digit code that you enter on the website to get in and that&#8217;s your second factor or multi-factor.</p>
<h4>2 &#8211; Code Generator</h4>
<p>The second type is using a code generator app on your phone or through a little hardware key that generates a 6 digit code for you and the same thing, user ID, password and then you get the code from your app to sign in.</p>
<h4>3 &#8211; Security Key</h4>
<p>And third, the most secure of all is using a security key. So these are little dongles that you plug into your laptop or into your phone. And when you get to have to authenticate to a service or application, you press the button on the security key and that authenticates you and then you&#8217;re in. So that&#8217;s multi-factor authentication.</p>
<p>So that’s it for this week. Let’s be careful out there and we’ll talk to you again next week.</p>
<p><a href="https://www.l2cybersecurity.com/" target="_blank" rel="noopener noreferrer">www.L2CyberSecurity.com</a></p>
<p><a href="http://www.twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">www.twitter.com/L2Cyber</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/weekendwisdom-017-multi-factor-authentication/">#WeekendWisdom 017 Multi-Factor Authentication</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2020/02/WeekendWisdom-017-lo.mp4" length="23538040" type="video/mp4" />

			</item>
	</channel>
</rss>
