Hi Robert,Everyone knows that two-factor authentication (2FA) is more secure than a simple login name and password, but too many people think that 2FA is a perfect, unhackable solution. It isn't!Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist, and security expert with over 30-years experience, for this webinar where he will explore 11 ways hackers can and do get around your favorite 2FA solution.
The webinar will include a (pre-filmed) hacking demo by worldwide hacking expert Kevin Mitnick, and real-life successful examples of every attack type. It will end by telling you how to better defend your 2FA solution so that you get maximum benefit and security.You'll learn about the good and bad of 2FA, and become a better computer security defender in the process.This webinar will cover:
- 11 ways hackers get around two-factor authentication
- How to defend your two-factor authentication solution
- The role humans play in a blended-defense strategy
Date/Time: Monday, May 21st at 1:00 PM ET
Don't like to click on redirected buttons? Copy & paste this link into your browser:
https://attendee.gotowebinar.com/register/5841469274003006978?source=HSWarm regards,Stu SjouwermanFounder and CEOKnowBe4, Inc.
Wednesday, May 16, 2018
11 Ways to Defeat Two-Factor Authentication
What is SOC-as-a-Service? By Robert Blake Having a Security Operations Center (SOC) in-house is expensive for the average business. Large ...
A managed IT service provider (MSP) is an outsourced company that takes care of a business's technology needs. They provide various serv...
Network segmentation refers to the process of dividing a computer network into smaller subnetworks, known as segments or zones. Each segment...