Cyber Security: Protecting Online Accounts

Описание к видео Cyber Security: Protecting Online Accounts

Keeping your accounts protected using different 2-step verification methods, including hardware security keys. Video includes Yubikey demonstration, as well password good practice and other security advice.

My own security keys are Yubikey 5C models, which you can find on Amazon.com here: https://amzn.to/3ubKrcs and on Amazon.co.uk here: https://amzn.to/2ZyDJlz (paid affiliate links). Note that I have no association with Yubico, and that I purchased the keys I use. However, note that an Amazon Associate I earn from qualifying purchases when you click on either of the Amazon links.

In this video I refer to keeping passwords on encrypted USB drives, which I have covered in the following videos:

“Encrypted USB Devices” (hardware encryption):
   • Encrypted USB Drives  

VeraCrypt Encrypted USB Drive (stand alone software encryption):
   • VeraCrypt Encrypted USB Drive  

DatAshur PRO Encryped USB 3.0 Drive (hardware encryption):
   • DatAshur PRO Encrypted USB 3.0 Drive  

The Microsoft blog post on a passwordless future is here:
https://www.microsoft.com/security/bl...

The 2019 Microsoft Security Baseline announcement in which they explain in detail why regularly changing (expiring) passwords is no longer necessary is here:
https://techcommunity.microsoft.com/t...

The YouTube post reporting that 2-step verification will be required for all monetizing channels from November 1st 2021 is here: https://support.google.com/youtube/th...

The Google Titan security key web page is here:
https://store.google.com/gb/product/t...

And the Yubico security key products page is here:
https://www.yubico.com/products/

The Yubikey page on setting up security keys in Linux (Ubuntu -- but it works in other distros) is here: https://support.yubico.com/hc/en-us/a...

More videos on computing and related topics can be found at    / explainingcomputers  

You may also like my ExplainingTheFuture channel at:    / explainingthefuture  

Chapters:
00:00 Introduction
00:35 Passwords & Beyond
03:14 Authentication Methods
05:45 Security Keys (hardware authentication devices)
09:31 Maximum Security

11:23 Two More Things

Комментарии

Информация по комментариям в разработке