Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.


 Popular Services
 (502) 212-2525



Triad IT Blog

Triad IT has been serving the Kentucky area since 1998, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

ALERT: Change Your Twitter Password, Says Twitter

ALERT: Change Your Twitter Password, Says Twitter

Twitter is recommending that all 336 million users change their passwords as soon as possible due to the discovery of an internal security flaw. While the issue has been fixed and no data breach seems to have taken place, Twitter is clearly taking this situation seriously.

On Thursday, May 3, it came to light that there was an internal log upon which an undisclosed number of account passwords were recorded without any protection. As a result, this unknown amount of passwords can no longer be considered secure, even though there is no apparent evidence that any data breach has occurred.

Twitter uses a process called hashing to protect their passwords, as many companies do. However, a bug created a log of passwords before they were hashed, leaving them fully legible. This bug has since been resolved.

In response to this situation, Twitter is being proactive and recommending that all of its users change their passwords, just in case. To do so, log in to your account in your browser, access Settings and privacy, and from there, Password. It is also a good idea to enable two-factor authentication by accessing Settings and privacy, clicking into Account. Once there, click on the “Set up login verification” button and follow the instructions. You will find yourself on a Login verification screen, where you can activate the means to generate another authentication code.

While disaster seems to be averted this time, you should not hesitate to change your password as soon as possible, and makes sure that all of your online accounts have strong passwords in place. For more information about keeping your identity safe online, call the IT professionals at Triad IT at (502) 212-2525.


Why You Need to Know the Difference Between “Value...
What to Do With Your Old Power Converters, Accordi...


No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Wednesday, June 20, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

IT Support Marketing Office Cybercrime Data Breach Server Management Wireless Charging Company Culture e-waste Malware Safety Telecommute Ink Specifications Data Management Tablet Passwords Microsoft Teams A.I. Social Media How To Tech Term Lead Generation Ransomware Battery Best Practices Virtual Assistant Internet Password Law Enforcement Settings Printing PowerPoint Artificial Intelligence Excel Productivity Thank You Computer Database Employer-Employee Relationship Cortana Patch Management Smartphones IT budget Apps Congratulations HP Hard Drive Hackers Business Intelligence Tip of the week WiFi Movies Cost Management User Tip Apple Threat Telecommuting Data Workers Connectivity Gmail Content Filtering Hosted Solutions Sales Efficiency Android Data loss Alert IT Services Outsourced IT Tactics Data Backup Maintenance Edge Smartphone Inventory Voice over IP Computers Sports Cloud Trends Paper Staff Managing Stress Mobile Security Downloads Network Attached Storage Security Virtualization Save Money Physical Security Small Business User Tips Processors Tip of the Week Automation Data Protection Collaboration Mobile Devices Server Managed IT services Holiday Antivirus Innovation RAM Bring Your Own Device Router Machine Learning Google Twitter Remote Computing Networking Paperless Office User Security Cloud Computing Network Security Internet of Things Vulnerability Backup Office 365 Tech Terms Facebook Hybrid Cloud IT Management Big Data Gadgets Spyware Knowledge Hard Drives Websites Spam Managed IT Service Business Computing SSD Applications Email Laptop Internet Explorer Windows 10 Cybersecurity Communications disposal eCommerce Streaming Media Document Management Comparison Technology Tips Communication Telephony Conferencing Business Management Miscellaneous Technology WannaCry Backup and Disaster Recovery Operating System Government Blockchain iPhone G Suite Business HIPAA Hardware Environment Privacy VPN Virus Chrome Data recovery Online Shopping Saving Money Value Microsoft Managed IT Services Analytics Wireless Unified Communications Dongle BDR Millennials File Sharing Phishing VoIp Software Digital Browser Business Technology Bandwidth Wi-Fi

Newsletter Sign Up