Be sure to subscribe to our podcast on iTunes and leave a nice review. “I need to do these things proactively because if something happens then it is too late.” -Troy Hunt Click To Tweet “Work with the assumption that there is going to be a data breach.” -Troy Hunt Click To Tweet CRYPTOMATOR TROY HUNT PASSWORD– Get a password manager and make all your passwords unique.– Go to Have I Been Pwned and enter all your email address and find out if your accounts are at risk.– Put that offensive hat on yourself with the goal to improve your own security.– Google Advanced Protection would be beneficial if you are in a high-risk position or you are technologically advanced enough to not screw it up.– All types of multi-factor authentication has advantages and drawbacks.– In Google’s Advanced Protection you have two keys in case one of them is lost.– Soft tokens can be put on any phone and just as easily be hi-jacked.– A password and an SMS are always better than just a password alone.Google Authenticator or a physical key fob? – Debit cards don’t get the same fraud protection as credit cards.– Credit cards are easy to replace and fix.– Would you suggest people use services like Paypal rather than providing a credit card for each e-commerce platform that they purchase from?.– Platforms will terminate your account for previously violated terms of service.Be selective about who you give data to and how much data you give them. Use unique passwords and a password manager. – Work with the assumption that there is going to be a breach.– How can people create a strong password to protect themselves from the effects of data breaches?.– We often capitalize the first letter of our old passwords so they fit the requirements.– Knowledge-based authentication is a weak form of identification, but every single person gets it.– The impact of data breaches on knowledge-based authentication.– What if every person used randomly generated passwords and a password manager? How much stuff would be different?.– These types of scams only work due to the prevalence of password reuse.– These scams are very successful because people feel as if they are specifically being targeted.– Scammers are preying on the social engineering mindset that we have.– There are many different scams that people can be targeted with as a result of data breaches.– The most impacted data breach he worked on was Ashley Madison.– The largest organic data breach was Myspace.– Troy’s biggest data breach ever recorded was 773 million accounts.– He has loaded over 430 data breaches onto his website.He was writing and sharing about all the lessons he was learning during this time of growth. – Troy shares about his massive business growth.– Chris shares that they started their companies for similar reasons and in similar ways.– Troy shares how he got the idea for Have I Been Pwned.“Be selective about who you give data to and how much data you give them.” -Troy Hunt Click To Tweet You'll regularly find him at major technology events. Troy regularly speaks around the world and runs developer-focused security workshops. CRYPTOMATOR TROY HUNT CODEAs well as being a useful service for the community, HIBP has given him an avenue to ship code that runs at scale on Microsoft's Azure cloud platform, one of the best ways we have of standing up services on the web today. CRYPTOMATOR TROY HUNT FREEOne of the key projects Troy is involved in today is Have I Been Pwned (HIBP), a free service that aggregates data breaches and helps people establish if they've been impacted by malicious activity on the web. As both an author and a student, Troy has nothing but positive things to say about the breadth and quality of Pluralsight courses. CRYPTOMATOR TROY HUNT PROFESSIONALThere's no better way to get up to speed on a topic quickly than through professional training that you can take at your own pace. Troy is a Pluralsight author of many top-rating courses on web security and other technologies with more than 30 courses published to date. You'll regularly find him in the press talking about security and even testifying before the US Congress on the impact of data breaches. He doesn’t work for Microsoft, but they're kind enough to recognize his community contributions by way of their award programs which he’s been a part of since 2011. Troy Hunt is an Australian Microsoft Regional Director and Microsoft Most Valuable Professional for Developer Security. Don’t miss the end where we share lots of strategies you can put in place today to better protect your information. Troy Hunt shares about the frequency and increasing size of data breaches of personal information. Has your information ever been compromised in a data breach? There are security measures you can implement to lessen the effects.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |