If technologies aren't simple, people are unlikely to adopt them. We see this all the time, particularly for complex security protections like 2-Factor Authentication. Google has for a long time been at the forefront of keeping it simple with QR code
Google Introduces New Settings for 2-Step Verification
by
Bryon Beilman |
June
24,
2016 |
Security,
cyber attacks
Business E-mail Compromise: Stay Suspicious of Emails from Upper Management!
by
Bryon Beilman |
June
20,
2016 |
Security,
Data Breach,
cyber attacks
Last week, the FBI released a report detailing the growth of “Business Email Compromise” scams. Since January 2015, there has been an increase of 1300% in identified losses. The scam has been reported by victims in all 50 states and in 100...
Avoid tech support phone scams
by
Bryon Beilman |
March
06,
2015 |
Security,
Scams,
Data Breach,
cyber attacks
Wednesday night, coincidentally on the eve of attending a security conference, I received a call from a man who claimed to be “Microsoft Support”. The caller said he was “following up on my support case” and needed access to my computer. Since iuvo...
Security Lessons Learned from the Syrian Electronic Army
by
Bryon Beilman |
May
13,
2014 |
Security,
Data Breach,
cyber attacks
by Bryon D Beilman
Do Hackers Get Too Much Credit ?
by
Bryon Beilman |
September
13,
2012 |
Process,
Tools,
Uncategorized,
Data Breach,
cyber attacks
by Bryon D Beilman