Cybersecurity basics
-
Whaling Attack
In business and finance, a whale is a big player, a high-net-worth individual or institution that can move markets at…
Read More » -
Personal Identifiable Information (PII)
Personal Identifiable Information (PII) is defined as: Any representation of information that permits the identity of an individual to whom…
Read More » -
Password management
Hackers harvest, weaponize and sell corporate and personal passwords in order to obtain financial reward, damage reputations, steal intellectual property,…
Read More » -
Passwordless Authentication
What is Passwordless Authentication? Passwordless Authentication is an authentication method that allows a user to gain access to an application…
Read More » -
Google Authenticator
If you set up 2-Step Verification, you can use the Google Authenticator app to receive codes. You can still receive…
Read More » -
Microsoft Authenticator
Set up an authenticator app as a two-step verification method You can set up an authenticator app to send a…
Read More » -
Crypto rug pulls
1. What is a rug pull in cryptocurrency? A rug pull is a type of crypto scam that occurs when…
Read More » -
What is MPC (Multi-Party Computation)?
“Not your keys, not your coins” has resulted in over $100 billion lost or stolen since the early 2010s, specifically…
Read More »