Posts

1Password

Review: 1Password

I started using Siber System’s RoboForm Password Manager in 2007 after a colleague recommended it.  I tried their free version briefly and then happily shelled out $20 for a license.  Since then, I’ve had different passwords on sites and have increasingly made them more complex over the years.  When I decided to leave RoboForm, mostly due to wanting better mobile applications and a distaste for their subscription model, I test drove both LastPass and 1Password.  Ultimately, I ended up with 1Password and still feel like it was the right decision.  I liked their integration and over time, their one-time license fee is a better bargain than paying a subscription fee annually. Read more

Sites with Security Hacks

How Many Times Have You Been Hacked?

Results: How many times have you been hacked?Half of American adults had their personal information exposed to hackers last year alone. In a recent attack at the federal Office of Personnel Management, hackers stole the most sensitive personal data for 21.5 million people.

The New York Times recently created a microsite that allows you to answer a few questions to learn which parts of your identity may have been stolen in some of the major hacking attacks over the last two years and what you can do about it. Not all attacks are included, and many attacks go undetected, so think of your results as a minimum level of exposure.

Here’s the link: http://www.nytimes.com/interactive/2015/07/29/technology/personaltech/what-parts-of-your-information-have-been-exposed-to-hackers-quiz.html

Two-Factor Authentication

Sites with Two-Factor Authentication

Looking for a way to keep your online accounts (cloud storage, banking, social media, email, etc.) as secure as possible?

Two-factor verification (also known as two-step authentication, abbreviated to TFA) is a process involving two stages to verify the identity of a user trying to access services in a computer or in a network. This is a special case of a multi-factor authentication which might involve only one of the three authentication factors (a knowledge factor, a possession factor, and an inherence factor) for both steps. If each step involves a different authentication factor then the two-step authentication is additionally two-factor authentication. (Wikipedia) Read more