“On September 28 and September 29 this week, a number of Microsoft customers worldwide were impacted by a cascading series of problems resulting in many being unable to access their Microsoft apps and services.”
FCC will require phone carriers to authenticate calls by June 2021
“The FCC announced today all carriers and phone companies must adopt the STIR/SHAKEN protocol by June 30th, 2021. The regulatory requirement is designed to combat robocalls, specifically those that try to hide their phone numbers by allowing carriers to authenticate caller IDs.”
Okta leverages machine learning with new risk-based authentication solution
“At this year’s Oktane19 attended by ITProPortal, Okta announced new risk-based authentication that can deliver greater security, ease of use and automated detection and response to identity-based attacks by leveraging machine learning.”
The Apps You Need to Deauthenticate Before Selling Your Devices
“Selling a computer, smartphone, or tablet should be as easy as wiping all your personal data off of it and handing it over to the buyer, but sometimes there are little hidden authentication things you might forget about.”
[OMG Hallelujah] Google No Longer Makes You Sign In Twice When Setting Up Accounts With Two-Factor Authentication Enabled On Android
“When certain things finally happen, they make us want to search for that hidden ladder that takes people up to the rooftop and scream “Hallelujah,” religious or no. This is one of those things.”
Using Google 2-step verification
Why you should use 2-step verification
2-step verification adds an extra layer of security to your Google Account by requiring you to have access to your phone – as well as your username and password – when you sign in. This means that if someone steals or guesses your password, the potential hijacker still can’t sign in to your account because they don’t have your phone.