Search Results


Showing 8 results for the search term "mcdermott two-factor".


Improve Your Security with Two-Factor Authentication

Two-step or two-factor authentication provides better security than a single factor. For instance, a fingerprint and PIN is stronger than either alone. Security professionals generally divide authentication techniques into three categories: something you have, something you know, and something you are. Corresponding examples would be a token or an app on a smartphone, a password, and […]



How to Protect Yourself From SIM Swapping Attacks

Two-factor authentication is rapidly becoming a “must-do” in this era of rampant cyber threats. I’ve discussed and encouraged two-factor authentication here and in Learning Tree’s cyber security introduction course. But it must be done correctly. Two-step and two-factor authentication Some organizations use hardware tokens that display numbers that change every thirty seconds or so. Apps […]



How Social Media Posts Can Lead to Identity Theft

For National Cyber Security Awareness Month, we are resharing some of our most popular cyber security blogs from the past year to ensure you are staying #CyberAware online – whether at home or in the office. Scrolling through Facebook the other day I saw meme “Comment below if you remember your childhood phone number.” I […]



How Password Spraying Could be an Attack Vector Into Your Organization

There are two common ways the bad guys might try to break into a building: spend lots of effort on one door or window, or try each door and window to see if one is easier to enter than the others. The same is true for attackers trying to compromise systems and networks (and penetration […]



How to Configure Linux for U2F Authentication

In my last post, I wrote about the benefits of U2F – Universal Two-Factor Authentication. Here are the three phases of installing it as the second factor on a Linux VM. For this article, I assume you have a Linux VM (or computer) configured with access to a USB port. I did this more as […]


Type to search blog.learningtree.com

Do you mean "" ?

Sorry, no results were found for your query.

Please check your spelling and try your search again.