An Exciting Second Week!

Have you turn on the MFA? If you don't know what we are talking about, it's time.

for the week of January 7th, 2024 | 2nd Edition

And It’s Only The Second Week!

No, it’s not because of the Consumer Electronics Show (CES) - and that’s all we are going to say about that this year - but Google and the SEC got hacked! That brings us to our spotlight for this week’s newsletter: 2FA or MFA (2-Factor or Multi-Factor Authentication). Turn it on and turn it up!

This Week’s Cybersecurity Highlights

  • Elections Roundup: Taiwan, European Parliament, Russia, India, South Africa, UK and many others will use AI to create deepfakes of all kinds to interfere in their elections.

  • 2024 Challenges: Forbes reports there are many challenges ahead for cybersecurity in 2024.

  • LoanDepot took systems offline after a cyberattack encrypted data, potentially impacting loan processing and phone service.

  • U.S. cities, bustling hubs of innovation and progress, also face a growing digital frontier in the form of cyberattacks, demanding constant vigilance and robust defenses to shield critical infrastructure and residents' data.

The only truly secure system is one that is off and locked in a vault, in a room with armed guards, and nobody knows where the vault is.

Gene Spafford

👩‍💻 PRO TIP ✍️
Get ready and help us advance into a passwordless society by turning on multi-factor authentication wherever you can find it. If you have to use a password, make sure it’s at least 19 characters.

2FA/MFA

  • Turn on 2-factor authentication or multi-factor authentication.

  • Get familiar with authentication app(s).

  • Exercise zero-trust — trust no one.

  • Question everything.

  • Back up everything that is important.

    The best cybersecurity software is you.
Sean Penn Starz GIF by Gaslit

Hexagon Center is here to:

  1. keep everyone vigilant on cybersecurity,

  2. prevent people from being victims of cyber crimes, and

  3. help anyone who has fallen prey to cyberattacks.

The Elephant In The Room

So Google/Gmail was hacked. What do its users do now?

Go into your account security and go through your signed-in devices in “Your Devices.” The current recommendation is to sign out of all the devices you see on there especially the ones you don’t recognize.

We will talk more about Google security in future editions.

Do you want to talk about this?

Title for the Editor's Note to talk about this edition.

about this edition

We are aware that the Google breach is important and there is a lot that we can do to overcome and fix it. We have received concerns that the newsletter is too long so we have decided to break the remedies up into several other editions, with the most important one mentioned above in this edition. We will continue to try to make this newsletter as concise as possible with only salient points.

We are grateful for the support that our readers have given us. We know that there are a lot more we can do but our current resources are limited. We also need willing hands and volunteers.

Spread cybersecurity culture

You can help reduce cyber crime victims by telling people to subscribe and offer them this resource.

You may reply to this newsletter or email us at
[email protected]

DISCLAIMER

Cybersecurity is an ever-changing field, and threats may evolve. While Hexagon Center strives to provide accurate and timely information, we cannot guarantee absolute security. Users are responsible for implementing their security measures and staying informed about the latest cybersecurity developments.

Reply

or to participate.