Two-factor authentication (2FA) is a commonly used means of securing access to website accounts through easily understood login procedures. Once the user provides the required information, whether a password or site generated code, a session cookie is generated and a secure session is established between the user and the site. But what if an unauthorized person eavesdrops and collects the 2FA information or session cookie?Read more »
- December 02, 2019 ‘Tis The Season: Online Shopping Tips
- November 18, 2019 Tax Considerations for Holiday Gifts to Employees
- November 05, 2019 Equal Pay and Barbie Dolls
- October 25, 2019 Amendments to the California Consumer Privacy Act Signed Into Law
- October 17, 2019 I Can’t Get Sued for Posting a Picture of Myself on Social Media… Can I?
- September 09, 2019 Ransomware Attack Trends: Tips for Prevention & Response
aba alabama arkansas audit audit logging biometric data bitcoin breach notification california ccpa checklist client notification colorado commission congress consumer notification credit card fraud cryptocurrency cybersecurity cyber threat data breach data privacy data privacy directive data protection officer data security delaware department of commerce employment encryption attack equifax ethereum ethics eu eu-u.s. data privacy shield eu-u.s. privacy shield european union fbi fcra federal communication federal trade commission financial firms financial fraud kill chain fincen forensics gdpr hacking hippa human resources identity theft illinois incidence response plan incident response insider attacks investigations irs legislative alert malware managed service providers manufacturing maryland massachusetts maze microsoft office 365 multi-factor identification net neutrality new jersey new mexico new york ninth circuit nist security controls nydfs ocabr online shopping patching personal data personal information phishing privacy act ransomware rdp regulations remote desktop protocol security posture assessment security vulnerabilities service provider agreement social engineering social media spear-phishing spokeo statute supreme court tax returns tennessee third party utah virginia virus washington wire transfers workplace policy