Tech in Ten
May 17, 2017
#20 Post-It Passwords
Tech In Tech #20
We revisit the “post-it tape” password technique! Why and how to use password management tools, two-factor authentication, and cheap insurance.…
Tech In Tech #20
We revisit the “post-it tape” password technique! Why and how to use password management tools, two-factor authentication, and cheap insurance.…
Tech In Ten #19
Cloudflare, the cloudbleed bug, and the importance of having an incident response policy.…
Tech In Ten #18
Paula guest stars and we continue to complain about technology and make fun of Mickey’s headphones. While we’re at it we namedrop some very obscure middle-English authors.…
Tech In Ten #17
Voice-activated cars? Not so much, but app notifications are ruining everyone’s life.…
Tech In Ten #16
Ernesto wants to read our website in Spanish. We discuss problems with translation, internationalization, and related issues.…
Tech In Ten #15
IT departments don’t bother themselves with website security. Your web security team should coordinate with your IT security. But you probably don’t have a web security team, do you?…
Tech In Ten #14
Using a post-it note roll to save passwords, and other time-honored password management techniques. Also: intrusion detection, and keeping brute-force hackers away.…
Tech in Ten #13
What do you when you get hacked as an organization? Ideally, you shouldn’t have to ask that question. But nothing is ideal about getting hacked. Mickey broke down some of the steps of what happens next.…
Tech in Ten #12
Mickey suggests that knowledge is power when it comes to developing good cyber security practices for an organization. The first step is a security assessment to help determine the risks faced by your organization to help …
Tech in Ten #11
We talk about phishing, spear-phishing, and other scary security things. We remind people that the best way to protect your organization from attacks is education.…