888.678.7282    Get SUPPORT

Strata Information Technology Blog

Strata Information Technology has been serving the Encino area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

ALERT: Change Your Twitter Password, Says Twitter

ALERT: Change Your Twitter Password, Says Twitter

Twitter is recommending that all 336 million users change their passwords as soon as possible due to the discovery of an internal security flaw. While the issue has been fixed and no data breach seems to have taken place, Twitter is clearly taking this situation seriously.

On Thursday, May 3, it came to light that there was an internal log upon which an undisclosed number of account passwords were recorded without any protection. As a result, this unknown amount of passwords can no longer be considered secure, even though there is no apparent evidence that any data breach has occurred.

Twitter uses a process called hashing to protect their passwords, as many companies do. However, a bug created a log of passwords before they were hashed, leaving them fully legible. This bug has since been resolved.

In response to this situation, Twitter is being proactive and recommending that all of its users change their passwords, just in case. To do so, log in to your account in your browser, access Settings and privacy, and from there, Password. It is also a good idea to enable two-factor authentication by accessing Settings and privacy, clicking into Account. Once there, click on the “Set up login verification” button and follow the instructions. You will find yourself on a Login verification screen, where you can activate the means to generate another authentication code.

While disaster seems to be averted this time, you should not hesitate to change your password as soon as possible, and makes sure that all of your online accounts have strong passwords in place. For more information about keeping your identity safe online, call the IT professionals at Strata Information Technology at 888.678.7282.

 

Why You Need to Know the Difference Between “Value...
What to Do With Your Old Power Converters, Accordi...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Sunday, June 24 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Tip of the Week Security Business Computing Managed IT Services Privacy Technology Best Practices Cloud Cybersecurity Malware Ransomware Hackers Backup Productivity Communications Outsourced IT Internet Alert Business Management Network Security VoIP Software Smartphones Save Money Hardware IT Support Business Social Media Microsoft Passwords Phishing App Vulnerability Email Tech Term Data Twitter Windows 10 Smartphone Data Breach Android IT Services Office 365 Politics Bandwidth Remote Monitoring Saving Money Government Cloud Computing Patch Management Mobile Device Management Business Continuity Excel Small Business Law Enforcement Workers Apps Productivity Miscellaneous User Tips Cybercrime Google Computer Settings Data Backup Microsoft Office Scam Website How To Applications Efficiency Spam Password Retail Entertainment Hosted Solutions Collaboration Recovery BDR Antivirus Maintenance Chrome Holiday Access Control Office Personal Information Browser Company Culture Employer-Employee Relationship Innovation Vendor Management Data Recovery Internet of Things Windows Wi-Fi Facebook Communication Blockchain Virus Mobile Device Education Computers Word Email Management e-waste Yahoo Staffing PowerPoint IT budget Telephone System Managing Stress Video Games Networking WannaCry Sales Worker disposal Information Technology Sports Television IT Management Physical Security Hard Drives DDoS Dongle Avoiding Downtime HIPAA Tablet Mobile Devices Printer Value Biometrics Connectivity Two-factor Authentication Tech Terms Files Remote Support Bring Your Own Device Hard Drive Knowledge Access Streaming Media Tech Support Leadership Managed IT Managed IT Service Hybrid Cloud Safety Technology Tips Employer Employee Relationship Processors Document Management Comparison Database The Internet of Things Hiring/Firing BYOD Phone System Downloads Budget Gadgets Encryption Telephony Emergency Apple Network Backup and Disaster Recovery Automobile Spyware Tactics Synergy Paperless Office Specifications Multi-Factor Security Analytics Trends SaaS Artificial Intelligence Users Voice over IP Licensing HP iPhone Scalability SSD Internet Explorer Digital Travel Gadget A.I. IaaS WiFi Business Intelligence Wireless Credit Cards Inventory Threat Edge Dark Data Content Filtering Router Smart Technology Live Streaming Printer Server Shortcut Movies HaaS Data Protection Telephone Systems Unified Threat Management Gmail WhatsApp Cortana Printers CrashOverride Cleaning Data loss Cost Management Wireless Charging Remote Control Current Events VPN Botnet Dark Web Managed Service Provider RAM Computer Care Staff Marketing Lead Generation Net Neutrality Data Management Google Maps Disaster Recovery News Battery Automation Microsoft Teams Gaming Console Websites Virtual Assistant Business Technology Customer Service Autocorrect Remote Computing Mobile Office Domains Managed IT Services Telecommuting G Suite Public Speaking Money Millennials Lithium-ion battery Google Drive Augmented Reality Network Attached Storage IT Support Hosted Solution Server Management Copy Cables Competition Big Data Fun VoIP Paste Voice over Internet Protocol Upgrade Conferencing Virtualization Machine Learning Scheduling eCommerce Emoji Search Server Telecommute Instagram Online Shopping Mobile Security Presentation Samsung Printing Laptop Unified Communications File Sharing 5G Operating System Wireless Technology Paper IBM User Tip Hacker User Security Spam Blocking Environment Ink Customer Relationship Management Tip of the week Windows 10 IP Address

Newsletter Sign Up