SlideShare a Scribd company logo
TWO FACTOR
AUTHENTICATION
Comprehensive Guide
by Team CTM360
Featured in ‘The 14 Providers That Matter Most’
- The Forrester Research Report, Q3 2018
CTM360 - ‘Technology Company of the Year’
- MEED Awards 2018
FORRESTER
RESEARCH
2 FACTOR AUTHENTICATION:
ACTIVATE IT EVERYWHERE
Most services nowadays require signup and login procedures
that are based on usernames and passwords.
Unfortunately, single-factor authentication is not enough to protect
accounts especially at the rate at which technologies are evolving, as
hackers become more sophisticated and are able to compromise accounts
in a matter of seconds. To top it all off, every year billions of usernames and
passwords are stolen and sold on dark web markets, and as a result, many
users become victims to identity theft and data loss.
Two-Factor Authentication (2FA) requires the user to enter a
password and then another verification code before he is given
access to the account.
This method keeps the account safe even after the first password has been
obtained by an unauthorized person. Once an account is compromised,
attackers can cause a lot of damage, especially to accounts used in the
workplace. This is why we strongly suggest that all accounts that support
2FA should have it enabled as soon as possible.
TWO FACTOR AUTHENTICATION : COMPREHENSIVE GUIDE BY CTM360® | 01
WORRYING FACTS ABOUT
TRADITIONAL SECURITY MEASURES
90%of passwords can
be cracked within
6 hours
63%of people are using the
same password for
multiple
accounts
BILLIONSof passwords are tested
every second by hackers
There has been a recent surge in Whatsapp account hijacking in the region. In most cases, this occurs through social
engineering where the victim receives a Whatsapp or IMO call and is asked to provide an SMS code which they received in
order to claim a prize. The code in the SMS is a WhatsApp phone number verification code. When acquired, this gives the
hijacker control of the account.
TWO FACTOR AUTHENTICATION : COMPREHENSIVE GUIDE BY CTM360® | 02
HOW ORGANIZATIONS AND
INDIVIDUALS CAN PROTECT
THEMSELVES
Using multi-factor authentication (MFA)
mechanisms, organizations, as well as
individuals, are able to get better security and
protect their environments, providing defense
from 80% of stolen credential security breaches.
This can be accomplished by using technical
controls (enforcing two-factor authentication
wherever centralized management is possible),
as well as via administrative controls (by creating
and enforcing a policy for accounts created using
business email addresses).
TWO FACTOR AUTHENTICATION : COMPREHENSIVE GUIDE BY CTM360® | 03
ENABLING 2FA ON
POPULAR ACCOUNTS
Using multi-factor authentication (MFA) mechanisms, organizations, as well as individuals, are able to get
better security and protect their environments, providing defense from 80% of stolen credential security
breaches.
1- Whatsapp → Settings → Account → Two-Step Verification
2- Twitter → Profile And Settings → Account → Security → Set Up Login Verification
3- Facebook → Settings → Security → Login Approvals
4- Google → Google Account → My Account → Sign-In & Security → Signing In To Google → 2-Step Verification
5- Instagram → Account → Settings → Privacy And Security → Two-Factor Authentication
6- Microsoft → Security Settings Page → Overview → Security Info → Set Up Two-Step Verification
7- Linkedin → Account → Login And Security → Add A Phone Number
TWO FACTOR AUTHENTICATION : COMPREHENSIVE GUIDE BY CTM360® | 04
FINANCIAL/PAYMENT ACCOUNT GUIDES
Amazon Pay - https://www.amazon.com/gp/help/customer/display.html?nodeId=201962420
PayPal - https://www.paypal.com/us/webapps/mpp/security/security-protections
Uber - https://help.uber.com/riders/article/2-step-verification
For more in-depth guides to configure 2FA on different commonly used accounts, please visit the
following links:
SOCIAL MEDIA ACCOUNT GUIDES
Facebook - https://www.facebook.com/help/148233965247823
LinkedIn - https://www.linkedin.com/help/linkedin/answer/531
YouTube - https://www.google.com/intl/en-US/landing/2step/features.html
Instagram - https://help.instagram.com/566810106808145
Google+ - https://www.google.com/intl/en-US/landing/2step/features.html
Pinterest - https://help.pinterest.com/en/article/two-factor-authentication
Snapchat - https://support.snapchat.com/en-US/article/enable-login-verification
Twitter - https://help.twitter.com/en/managing-your-account/two-factor-authentication
Tumblr - https://tumblr.zendesk.com/hc/en-us/articles/226270148-Two-factor-authentication
TWO FACTOR AUTHENTICATION : COMPREHENSIVE GUIDE BY CTM360® | 05
CLOUD SERVICES ACCOUNT GUIDES
Office 365 -
https://support.office.com/en-US/article/Set-up-multi-factor-authentication-for-Office-365-8f0454b2-
f51a-4d9c-bcde-2c48e41621c6
Apple iCloud -
https://support.apple.com/en-bh/HT204152
Dropbox -
https://www.dropbox.com/en/help/security/enable-two-step-verification
OneDrive -
https://support.microsoft.com/en-us/help/12408/microsoft-account-how-to-use-two-step-verification
GitHub -
https://help.github.com/en/articles/about-two-factor-authentication
MongoDB Cloud Manager -
https://docs.cloudmanager.mongodb.com/core/two-factor-authentication/
Amazon AWS WorkSpaces -
https://aws.amazon.com/blogs/aws/multi-factor-auth-for-workspaces/
TWO FACTOR AUTHENTICATION : COMPREHENSIVE GUIDE BY CTM360® | 06
EMAIL & COMMUNICATION ACCOUNT GUIDES
WhatsApp -
https://faq.whatsapp.com/en/general/26000021
HootSuite -
https://help.hootsuite.com/hc/en-us/articles/204595950-Manage-Google-Authenticator
LastPass -
https://support.logmeininc.com/lastpass/help/manage-trusted-devices-for-multifactor-authentication-
lp030010
Slack -
https://get.slack.help/hc/en-us/articles/204509068-Enabling-two-factor-authentication
MailChimp -
https://mailchimp.com/help/set-up-a-two-factor-authentication-app-at-login/
Yahoo Mail -
https://help.yahoo.com/kb/SLN5013.html
TWO FACTOR AUTHENTICATION : COMPREHENSIVE GUIDE BY CTM360® | 07
DOMAIN & HOSTING ACCOUNT GUIDES
If you would like to verify if any other platforms that support 2FA, you can visit the following link for
further information and guides:
https://twofactorauth.org/
Remember that your account security does not only affect you as an individual but can also impact your
organization and everyone you communicate with. Enable 2FA on all of your accounts today and reduce
your overall digital risk.
Wordpress - https://en.support.wordpress.com/security/two-step-authentication/
GoDaddy - https://www.godaddy.com/help/enable-two-step-verification-7502
eNom - https://www.enom.com/kb/kb/kb_1687-setup-2-factor.htm
Nominet - https://registrars.nominet.uk/sites/default/files/two_factor_authentication_userguide.pdf
Joomla - https://docs.joomla.org/J3.x:Two_Factor_Authentication
CloudFlare - https://support.cloudflare.com/hc/en-us/articles/200167866-How-do-I-set-up-two-
factor-authentication
DigiCert - https://www.digicert.com/two-factor-authentication.htm
SSLTrust - https://www.ssltrust.com.au/help/account-management/enable-2factor
TWO FACTOR AUTHENTICATION : COMPREHENSIVE GUIDE BY CTM360® | 08TWO FACTOR AUTHENTICATION : COMPREHENSIVE GUIDE BY CTM360® | 08
References:
https://www.informationsecuritybuzz.com/news/three-five-use-password-across-multiple-online-accounts/
https://www.statista.com/statistics/273550/data-breaches-recorded-in-the-united-states-by-number-of-breaches-and-records-exposed/
https://www.zdnet.com/article/gdpr-an-executive-guide-to-what-you-need-to-know/
https://www.grahamcluley.com/factor-authentication-2fa-versus-step-verification-2sv/
https://www.grahamcluley.com/protect-facebook-account-2-step-verification-2sv/
https://www.grahamcluley.com/twitter-login-verification/
https://www.grahamcluley.com/how-to-enable-2-step-verification-2sv-on-your-whatsapp-account/
https://www.grahamcluley.com/protect-amazon-account-step-verification-2sv/
https://www.grahamcluley.com/better-protect-google-account-step-verification-2sv/
https://www.grahamcluley.com/protect-dropbox-account-step-verification-2sv/
https://www.grahamcluley.com/office-365-multi-factor-authentication/
https://www.grahamcluley.com/how-to-protect-your-microsoft-account-with-two-step-verification-2sv/
https://www.grahamcluley.com/tumblr-2sv/
https://www.grahamcluley.com/protect-linkedin-account-step-verification-2sv/
https://www.grahamcluley.com/protect-paypal-account-step-verification-2sv/
https://www.grahamcluley.com/protect-yahoo-account-2sv/
https://www.grahamcluley.com/protect-apple-account/
https://www.grahamcluley.com/better-protect-google-account-step-verification-google-authenticator/
https://www.grahamcluley.com/protect-hootsuite-account-hackers/
https://www.grahamcluley.com/better-protect-instagram-account-using-two-step-verification-2sv/
https://www.grahamcluley.com/instagram-finally-supports-third-party-2fa-apps-for-greater-account-security/
https://support.cloudflare.com/hc/en-us/articles/200167866-What-is-Authy-2-Factor-Authentication-
https://help.github.com/en/articles/configuring-two-factor-authentication-recovery-methods
TWO FACTOR AUTHENTICATION : COMPREHENSIVE GUIDE BY CTM360® | 09
CONTACT US:
6th floor,
Citibank House,
Seef District,
Kingdom of Bahrain
+973 77 360 360
info@ctm360.com
www.ctm360.com
Featured in ‘The 14 Providers That Matter Most’
- The Forrester Research Report, Q3 2018
CTM360 - ‘Technology Company of the Year’
- MEED Awards 2018
FORRESTER
RESEARCH

More Related Content

What's hot

Ransomware
RansomwareRansomware
Ransomware
DeepakKumar4980
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
mateenzero
 
Seminar-Two Factor Authentication
Seminar-Two Factor AuthenticationSeminar-Two Factor Authentication
Seminar-Two Factor AuthenticationDilip Kr. Jangir
 
User security awareness
User security awarenessUser security awareness
User security awareness
K. A. M Lutfullah
 
Phishing awareness
Phishing awarenessPhishing awareness
Phishing awareness
PhishingBox
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in India
Yogesh Lolge
 
Phishing
PhishingPhishing
Phishing
anjalika sinha
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing Sudan
Ahmed Musaad
 
Ppt
PptPpt
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
Michel Bitter
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
ICT Frame Magazine Pvt. Ltd.
 
Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08
DallasHaselhorst
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Stephen Cobb
 
Two Factor Authentication (2FA) Deep Dive: How to Choose the Right Solution f...
Two Factor Authentication (2FA) Deep Dive: How to Choose the Right Solution f...Two Factor Authentication (2FA) Deep Dive: How to Choose the Right Solution f...
Two Factor Authentication (2FA) Deep Dive: How to Choose the Right Solution f...
ConorGilsenan1
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityAtlantic Training, LLC.
 
Password management for you
Password management for youPassword management for you
Password management for you
Chit Ko Ko Win
 
Spear Phishing Attacks
Spear Phishing AttacksSpear Phishing Attacks
Spear Phishing Attacks
n|u - The Open Security Community
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
belsis
 
Desktop Security
Desktop SecurityDesktop Security
Desktop Security
HardikBhandari7
 

What's hot (20)

Ransomware
RansomwareRansomware
Ransomware
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Seminar-Two Factor Authentication
Seminar-Two Factor AuthenticationSeminar-Two Factor Authentication
Seminar-Two Factor Authentication
 
User security awareness
User security awarenessUser security awareness
User security awareness
 
Phishing awareness
Phishing awarenessPhishing awareness
Phishing awareness
 
Mobile security issues & frauds in India
Mobile security issues & frauds in IndiaMobile security issues & frauds in India
Mobile security issues & frauds in India
 
Phishing
PhishingPhishing
Phishing
 
Password management
Password managementPassword management
Password management
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing Sudan
 
Ppt
PptPpt
Ppt
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Two Factor Authentication (2FA) Deep Dive: How to Choose the Right Solution f...
Two Factor Authentication (2FA) Deep Dive: How to Choose the Right Solution f...Two Factor Authentication (2FA) Deep Dive: How to Choose the Right Solution f...
Two Factor Authentication (2FA) Deep Dive: How to Choose the Right Solution f...
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
 
Password management for you
Password management for youPassword management for you
Password management for you
 
Spear Phishing Attacks
Spear Phishing AttacksSpear Phishing Attacks
Spear Phishing Attacks
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
Desktop Security
Desktop SecurityDesktop Security
Desktop Security
 

Similar to TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE

securing-consumer-portals-consumer-access-management-as-business-driver-and-p...
securing-consumer-portals-consumer-access-management-as-business-driver-and-p...securing-consumer-portals-consumer-access-management-as-business-driver-and-p...
securing-consumer-portals-consumer-access-management-as-business-driver-and-p...Milos Pesic
 
Data Con LA 2019 - So You got Hacked, how Quickly Can your Company Recover? b...
Data Con LA 2019 - So You got Hacked, how Quickly Can your Company Recover? b...Data Con LA 2019 - So You got Hacked, how Quickly Can your Company Recover? b...
Data Con LA 2019 - So You got Hacked, how Quickly Can your Company Recover? b...
Data Con LA
 
Role Of Two Factor Authentication In Safeguarding Online Transactions
Role Of Two Factor Authentication In Safeguarding Online TransactionsRole Of Two Factor Authentication In Safeguarding Online Transactions
Role Of Two Factor Authentication In Safeguarding Online Transactions
ITIO Innovex
 
Risk Aware IAM for an Insecure World
Risk Aware IAM for an Insecure WorldRisk Aware IAM for an Insecure World
Risk Aware IAM for an Insecure World
Forte Advisory, Inc.
 
Cyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access managementCyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access management
seadeloitte
 
What about Two Factor Authentication?
What about Two Factor Authentication? What about Two Factor Authentication?
What about Two Factor Authentication?
Sinch
 
Guide to MFA
Guide to MFAGuide to MFA
Guide to MFA
Jack Forbes
 
5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!
Caroline Johnson
 
SECURITY THE POWER OF MULTI-FACTOR AUTHENTICATION
SECURITY THE POWER OF MULTI-FACTOR AUTHENTICATIONSECURITY THE POWER OF MULTI-FACTOR AUTHENTICATION
SECURITY THE POWER OF MULTI-FACTOR AUTHENTICATION
Protected Harbor
 
Why Two-Factor Isn't Enough
Why Two-Factor Isn't EnoughWhy Two-Factor Isn't Enough
Why Two-Factor Isn't Enough
SecureAuth
 
IRJET- Enhancement in Netbanking Security
IRJET-  	  Enhancement in Netbanking SecurityIRJET-  	  Enhancement in Netbanking Security
IRJET- Enhancement in Netbanking Security
IRJET Journal
 
2 fa it101
2 fa it1012 fa it101
2 fa it101
c_______101
 
Business Email Compromise: A Symptom Not A Cause.pdf
Business Email Compromise: A Symptom Not A Cause.pdfBusiness Email Compromise: A Symptom Not A Cause.pdf
Business Email Compromise: A Symptom Not A Cause.pdf
Niloufer Tamboly
 
A Simplified Guide to the Evolution of Authentication!
A Simplified Guide to the Evolution of Authentication!A Simplified Guide to the Evolution of Authentication!
A Simplified Guide to the Evolution of Authentication!
Caroline Johnson
 
What is two factor or multi-factor authentication
What is two factor or multi-factor authenticationWhat is two factor or multi-factor authentication
What is two factor or multi-factor authentication
Jack Forbes
 
IRJET- Secured Merchant Payment using Biometric Transaction
IRJET-  	  Secured Merchant Payment using Biometric TransactionIRJET-  	  Secured Merchant Payment using Biometric Transaction
IRJET- Secured Merchant Payment using Biometric Transaction
IRJET Journal
 
Small_Merchant_Guide_to_Safe_Payments
Small_Merchant_Guide_to_Safe_PaymentsSmall_Merchant_Guide_to_Safe_Payments
Small_Merchant_Guide_to_Safe_PaymentsSteve Abrams
 
Optimize Your Zero Trust Infrastructure
Optimize Your Zero Trust InfrastructureOptimize Your Zero Trust Infrastructure
Optimize Your Zero Trust Infrastructure
Ping Identity
 

Similar to TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE (20)

securing-consumer-portals-consumer-access-management-as-business-driver-and-p...
securing-consumer-portals-consumer-access-management-as-business-driver-and-p...securing-consumer-portals-consumer-access-management-as-business-driver-and-p...
securing-consumer-portals-consumer-access-management-as-business-driver-and-p...
 
Data Con LA 2019 - So You got Hacked, how Quickly Can your Company Recover? b...
Data Con LA 2019 - So You got Hacked, how Quickly Can your Company Recover? b...Data Con LA 2019 - So You got Hacked, how Quickly Can your Company Recover? b...
Data Con LA 2019 - So You got Hacked, how Quickly Can your Company Recover? b...
 
Role Of Two Factor Authentication In Safeguarding Online Transactions
Role Of Two Factor Authentication In Safeguarding Online TransactionsRole Of Two Factor Authentication In Safeguarding Online Transactions
Role Of Two Factor Authentication In Safeguarding Online Transactions
 
Risk Aware IAM for an Insecure World
Risk Aware IAM for an Insecure WorldRisk Aware IAM for an Insecure World
Risk Aware IAM for an Insecure World
 
Links-EN
Links-ENLinks-EN
Links-EN
 
Cyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access managementCyber 101: An introduction to privileged access management
Cyber 101: An introduction to privileged access management
 
What about Two Factor Authentication?
What about Two Factor Authentication? What about Two Factor Authentication?
What about Two Factor Authentication?
 
Guide to MFA
Guide to MFAGuide to MFA
Guide to MFA
 
5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!
 
SECURITY THE POWER OF MULTI-FACTOR AUTHENTICATION
SECURITY THE POWER OF MULTI-FACTOR AUTHENTICATIONSECURITY THE POWER OF MULTI-FACTOR AUTHENTICATION
SECURITY THE POWER OF MULTI-FACTOR AUTHENTICATION
 
Why Two-Factor Isn't Enough
Why Two-Factor Isn't EnoughWhy Two-Factor Isn't Enough
Why Two-Factor Isn't Enough
 
IRJET- Enhancement in Netbanking Security
IRJET-  	  Enhancement in Netbanking SecurityIRJET-  	  Enhancement in Netbanking Security
IRJET- Enhancement in Netbanking Security
 
2 fa it101
2 fa it1012 fa it101
2 fa it101
 
Business Email Compromise: A Symptom Not A Cause.pdf
Business Email Compromise: A Symptom Not A Cause.pdfBusiness Email Compromise: A Symptom Not A Cause.pdf
Business Email Compromise: A Symptom Not A Cause.pdf
 
A Simplified Guide to the Evolution of Authentication!
A Simplified Guide to the Evolution of Authentication!A Simplified Guide to the Evolution of Authentication!
A Simplified Guide to the Evolution of Authentication!
 
What is two factor or multi-factor authentication
What is two factor or multi-factor authenticationWhat is two factor or multi-factor authentication
What is two factor or multi-factor authentication
 
IRJET- Secured Merchant Payment using Biometric Transaction
IRJET-  	  Secured Merchant Payment using Biometric TransactionIRJET-  	  Secured Merchant Payment using Biometric Transaction
IRJET- Secured Merchant Payment using Biometric Transaction
 
Small_Merchant_Guide_to_Safe_Payments
Small_Merchant_Guide_to_Safe_PaymentsSmall_Merchant_Guide_to_Safe_Payments
Small_Merchant_Guide_to_Safe_Payments
 
test
testtest
test
 
Optimize Your Zero Trust Infrastructure
Optimize Your Zero Trust InfrastructureOptimize Your Zero Trust Infrastructure
Optimize Your Zero Trust Infrastructure
 

More from CTM360

Secure web conferencing for c level executives
Secure web conferencing for c level executivesSecure web conferencing for c level executives
Secure web conferencing for c level executives
CTM360
 
CTM360 Advisory: Remote Work Guidelines
CTM360 Advisory: Remote Work GuidelinesCTM360 Advisory: Remote Work Guidelines
CTM360 Advisory: Remote Work Guidelines
CTM360
 
Cyber Threat Advisory: Coronavirus Related Scams
Cyber Threat Advisory: Coronavirus Related ScamsCyber Threat Advisory: Coronavirus Related Scams
Cyber Threat Advisory: Coronavirus Related Scams
CTM360
 
Unlocking New Doorways to Multi-channel Scams
Unlocking New Doorways to Multi-channel ScamsUnlocking New Doorways to Multi-channel Scams
Unlocking New Doorways to Multi-channel Scams
CTM360
 
The Spread of Fake News - CTM360 - GI December 2017
The Spread of Fake News - CTM360 - GI December 2017The Spread of Fake News - CTM360 - GI December 2017
The Spread of Fake News - CTM360 - GI December 2017
CTM360
 
Cyber Warrior - Business in Gulf 2017
Cyber Warrior - Business in Gulf  2017Cyber Warrior - Business in Gulf  2017
Cyber Warrior - Business in Gulf 2017
CTM360
 
NME IT Security Survey 2016
NME IT Security Survey 2016 NME IT Security Survey 2016
NME IT Security Survey 2016
CTM360
 
TRAP10 Cyber Scam Targeting Unaware GCC Residents
TRAP10 Cyber Scam Targeting Unaware GCC Residents TRAP10 Cyber Scam Targeting Unaware GCC Residents
TRAP10 Cyber Scam Targeting Unaware GCC Residents
CTM360
 
XSS, LFI & CSRF vulnerabilities
XSS, LFI & CSRF vulnerabilitiesXSS, LFI & CSRF vulnerabilities
XSS, LFI & CSRF vulnerabilities
CTM360
 
DMARC Implementation across all domains
DMARC Implementation across all domainsDMARC Implementation across all domains
DMARC Implementation across all domains
CTM360
 
CTM360 adv-0317-01 dns messenger
CTM360 adv-0317-01 dns messengerCTM360 adv-0317-01 dns messenger
CTM360 adv-0317-01 dns messenger
CTM360
 

More from CTM360 (11)

Secure web conferencing for c level executives
Secure web conferencing for c level executivesSecure web conferencing for c level executives
Secure web conferencing for c level executives
 
CTM360 Advisory: Remote Work Guidelines
CTM360 Advisory: Remote Work GuidelinesCTM360 Advisory: Remote Work Guidelines
CTM360 Advisory: Remote Work Guidelines
 
Cyber Threat Advisory: Coronavirus Related Scams
Cyber Threat Advisory: Coronavirus Related ScamsCyber Threat Advisory: Coronavirus Related Scams
Cyber Threat Advisory: Coronavirus Related Scams
 
Unlocking New Doorways to Multi-channel Scams
Unlocking New Doorways to Multi-channel ScamsUnlocking New Doorways to Multi-channel Scams
Unlocking New Doorways to Multi-channel Scams
 
The Spread of Fake News - CTM360 - GI December 2017
The Spread of Fake News - CTM360 - GI December 2017The Spread of Fake News - CTM360 - GI December 2017
The Spread of Fake News - CTM360 - GI December 2017
 
Cyber Warrior - Business in Gulf 2017
Cyber Warrior - Business in Gulf  2017Cyber Warrior - Business in Gulf  2017
Cyber Warrior - Business in Gulf 2017
 
NME IT Security Survey 2016
NME IT Security Survey 2016 NME IT Security Survey 2016
NME IT Security Survey 2016
 
TRAP10 Cyber Scam Targeting Unaware GCC Residents
TRAP10 Cyber Scam Targeting Unaware GCC Residents TRAP10 Cyber Scam Targeting Unaware GCC Residents
TRAP10 Cyber Scam Targeting Unaware GCC Residents
 
XSS, LFI & CSRF vulnerabilities
XSS, LFI & CSRF vulnerabilitiesXSS, LFI & CSRF vulnerabilities
XSS, LFI & CSRF vulnerabilities
 
DMARC Implementation across all domains
DMARC Implementation across all domainsDMARC Implementation across all domains
DMARC Implementation across all domains
 
CTM360 adv-0317-01 dns messenger
CTM360 adv-0317-01 dns messengerCTM360 adv-0317-01 dns messenger
CTM360 adv-0317-01 dns messenger
 

Recently uploaded

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 

Recently uploaded (20)

DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 

TWO FACTOR AUTHENTICATION - COMPREHENSIVE GUIDE