Our Most Popular Managed Services

If you need help deciding what services are best for your business let us know.

Logo

 
 Popular Services
 (502) 212-2525

Logo

 

Triad IT Blog

ALERT: Change Your Twitter Password, Says Twitter

ALERT: Change Your Twitter Password, Says Twitter

Twitter is recommending that all 336 million users change their passwords as soon as possible due to the discovery of an internal security flaw. While the issue has been fixed and no data breach seems to have taken place, Twitter is clearly taking this situation seriously.

On Thursday, May 3, it came to light that there was an internal log upon which an undisclosed number of account passwords were recorded without any protection. As a result, this unknown amount of passwords can no longer be considered secure, even though there is no apparent evidence that any data breach has occurred.

Twitter uses a process called hashing to protect their passwords, as many companies do. However, a bug created a log of passwords before they were hashed, leaving them fully legible. This bug has since been resolved.

In response to this situation, Twitter is being proactive and recommending that all of its users change their passwords, just in case. To do so, log in to your account in your browser, access Settings and privacy, and from there, Password. It is also a good idea to enable two-factor authentication by accessing Settings and privacy, clicking into Account. Once there, click on the “Set up login verification” button and follow the instructions. You will find yourself on a Login verification screen, where you can activate the means to generate another authentication code.

While disaster seems to be averted this time, you should not hesitate to change your password as soon as possible, and makes sure that all of your online accounts have strong passwords in place. For more information about keeping your identity safe online, call the IT professionals at Triad IT at (502) 212-2525.

 

Why You Need to Know the Difference Between “Value...
What to Do With Your Old Power Converters, Accordi...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, October 17, 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

IT Services Staff Remote Computing Spam Microsoft Office Hard Drives User Tip WannaCry Security Malware Downloads Technology Tips Cloud Marketing iPhone Spyware Paperless Office IT Support Proactive IT Smartphones Android Operating System Data Backup Managed Service Best Practices Compliance File Sharing Data Breach Millennials Browser HP Websites VoIp Antivirus Data Backup and Disaster Recovery Office 365 Online Shopping Plug-In Machine Learning Google Conferencing Processors Router VPN Wireless Hackers Business Technology Lead Generation Artificial Intelligence Vulnerability Business Users Workers Voice over IP Collaboration Patch Management Server Hybrid Cloud Wi-Fi Database Big Data Value Business Management Regulation Internet Explorer Information HIPAA Government Data Management User Security Tip of the Week Applications Computers Facebook Thank You Password Tablet Workplace Tips Employer-Employee Relationship SSD Hosted Solutions Bring Your Own Device disposal Telecommuting G Suite IT budget Network Security Backup Social Media eCommerce IT Management Network Attached Storage A.I. Software Comparison Tech Terms Safety Alert Gmail Virtual Assistant Physical Security Ransomware Amazon Hard Drive Managed IT Services Data loss Ink Windows 10 Technology Email Cables Data Protection PowerPoint Apple Managed IT services Connectivity Laptop Tactics Printing Cybersecurity Trends Mobile Devices Server Management Tip of the week How To Hardware Remote Monitoring and Management e-waste Innovation Managed IT Service WiFi Miscellaneous Saving Money Outsourced IT Network BDR Office Managing Stress Mobile Security Content Filtering Blockchain Cortana Law Enforcement Microsoft Teams Cloud Computing Digital Settings Business Intelligence Networking Dongle Tech Term Internet of Things Gadgets Threat Sports Twitter Movies Cost Management Wireless Charging Environment Computer Telephony RAM Document Management Productivity Internet Chrome Specifications Data recovery Voice over Internet Protocol Privacy Congratulations Microsoft Reporting Communications Virtualization Phishing Apps Passwords Holiday Unified Communications Communication Virus Paper Small Business Sales Cybercrime Bandwidth Inventory Telecommute Efficiency Analytics Smartphone Edge Company Culture Analysis Knowledge Streaming Media Maintenance Automation Business Computing Save Money User Tips Battery Excel

Newsletter Sign Up