Today more of our world is digital than ever before. Everything from reading the newspaper, to checking what your friends are up to, to ordering food or even ordering some new clothes requires some kind of account. Moreover, most of these accounts
Read moreTNP Blog
How to Prevent Account Takeovers in 2021
Smartphone technology has transformed our lives in ways that go beyond mere communication. At the tap of a finger, you can perform just about any function if and when you want to — including making payments.
Read moreThe Importance of Multi-Factor Authentication and How to Set It Up
The majority of cybersecurity attacks happen because people don’t pay much attention to login security. Many users are making it easy for hackers to enter systems and accounts simply because they fail to set up strong passwords. Weak credentials can
Read moreFor years, we’ve been told that strong passwords include three things: upper- and lowercase letters, numbers, and symbols. And why wouldn’t we when the National Institute of Standards and Technology (NIST) told us they were the minimum for robust
Read moreKeeping your personal and professional information safe from cybercriminals is not easy. It takes constant vigilance and frequent training. There are dozens of simple tools and tips to help people with almost zero expertise stay safe online, but
Read moreGoogle releases year-long security study
Your passwords are the gateway to your files, money, and identity, so it’s no surprise that hackers are constantly trying to steal them. Most cybercriminals will use malware to do the trick, but they also have other means at their disposal. Google’s
Read moreA password policy designed for federal agencies must be secure, right? Surprisingly, that hasn’t been the case according to the National Institute of Standards and Technology (NIST). On the hook for the password best practices that we still use
Read moreOffice 365 users face new phishing scam
With the popularity of Office 365, hackers are trying to find new ways to exploit its users, and they’ve come up with a new idea: a credential-harvesting campaign that uses personalized spear-phishing mails as a tool. If you’re an Office 365 user
Read more