Hi Robert,Everyone knows that two-factor authentication (2FA) is more secure than a simple login name and password, but too many people think that 2FA is a perfect, unhackable solution. It isn't!Join Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist, and security expert with over 30-years experience, for this webinar where he will explore 11 ways hackers can and do get around your favorite 2FA solution.
The webinar will include a (pre-filmed) hacking demo by worldwide hacking expert Kevin Mitnick, and real-life successful examples of every attack type. It will end by telling you how to better defend your 2FA solution so that you get maximum benefit and security.You'll learn about the good and bad of 2FA, and become a better computer security defender in the process.This webinar will cover:
- 11 ways hackers get around two-factor authentication
- How to defend your two-factor authentication solution
- The role humans play in a blended-defense strategy
Date/Time: Monday, May 21st at 1:00 PM ET
Don't like to click on redirected buttons? Copy & paste this link into your browser:
https://attendee.gotowebinar.com/register/5841469274003006978?source=HSWarm regards,Stu SjouwermanFounder and CEOKnowBe4, Inc.
Technology companies come and go, but Bit by Bit backs its service with 30 years of experience helping businesses achieve their goals with reliable IT solutions and support. We were established in 1987 as a database application development and networking company, and since then we’ve evolved into a full-service IT firm and leader in delivering powerful and cost-effective technology solutions. visit our site at www.bitxbit.com
Wednesday, May 16, 2018
11 Ways to Defeat Two-Factor Authentication
Subscribe to: Post Comments (Atom)
What is SOC-as-a-Service? By Robert Blake Having a Security Operations Center (SOC) in-house is expensive for the average business. Large ...
How Cybercriminals Use Manipulation By Robert Blake Cybercrime occurs when computers are used to gain unauthorized access. Typically, it...
5 Benefits of Using IT Lifecycle Management Services by Robert Blake Technology plays a key role in any workplace, but it can eventually g...
Post a Comment