You Can Now Log into Microsoft Services with No Password

Users of Microsoft services such as Outlook, Office 365, OneDrive, Skype, and Xbox Live will now get to enjoy the benefits of not having to remember their passwords.  Now, with physical hardware keys using the FIDO2 technology, access to a Microsoft account is as simple as plugging into a USB port or using Bluetooth or NFC to pair a phone to the key.

Initially, the keys were used as part of a two-factor authentication policy, but new browser technology has enabled the elimination of the password requirement.  Now, Microsoft's no-password log on process offers three options:

You Can Now Log into Microsoft Services with No Password

Users of Microsoft services such as Outlook, Office 365, OneDrive, Skype, and Xbox Live will now get to enjoy the benefits of not having to remember their passwords.  Now, with physical hardware keys using the FIDO2 technology, access to a Microsoft account is as simple as plugging into a USB port or using Bluetooth or NFC to pair a phone to the key.

Initially, the keys were used as part of a two-factor authentication policy, but new browser technology has enabled the elimination of the password requirement.  Now, Microsoft's no-password log on process offers three options:

Dell EMC Introduces New Cyber Recovery Software

PaperFree partner Dell EMC recently announced their new Dell EMC Cyber Recovery and Cyber Recovery Services products - both designed to serve as a "last line of data protection defense against ransomware and destructive cyber attacks."  These software packages include automation, workflow, and security analytics tools to help isolate secure copies of critical data in a way that those copies are protected, but still available for use should a system recovery need to be made.

Dell EMC Introduces New Cyber Recovery Software

PaperFree partner Dell EMC recently announced their new Dell EMC Cyber Recovery and Cyber Recovery Services products - both designed to serve as a "last line of data protection defense against ransomware and destructive cyber attacks."  These software packages include automation, workflow, and security analytics tools to help isolate secure copies of critical data in a way that those copies are protected, but still available for use should a system recovery need to be made.

Google Aims to Axe the URL

URLs have become ubiquitous in our time - nearly every company and individual has some sort of online presence - all with associated URLs.  And, while URLs for the biggest names are generally easy to guess (simply add a .com to their name) - that's not always the case, as is such with nissan.com and companies that use .biz or .info top level domain names.  Worse yet, a wrong guess can land you on a webpage that you definitely don't want to be on.  Google wants to take the guesswork out of URLs.

Google Aims to Axe the URL

URLs have become ubiquitous in our time - nearly every company and individual has some sort of online presence - all with associated URLs.  And, while URLs for the biggest names are generally easy to guess (simply add a .com to their name) - that's not always the case, as is such with nissan.com and companies that use .biz or .info top level domain names.  Worse yet, a wrong guess can land you on a webpage that you definitely don't want to be on.  Google wants to take the guesswork out of URLs.

The Fraud Detection Experts - Your Bank?

Believe it or not, your bank is among the experts in fraud detection.  Many of us have experienced urgent phone calls from the bank when we make a larger-than-normal purchase, and this is a good thing.  The bank's systems constantly track customers' card use - amount, locations, day of time, etc. to develop a map of your spending habits - and it's when something wanders out of this map that they alert customers before serious damage can be done.  Doing so gives customers a chance to interrupt fraud as it happens, as well as minimizing losses for the bank.

The Fraud Detection Experts - Your Bank?

Believe it or not, your bank is among the experts in fraud detection.  Many of us have experienced urgent phone calls from the bank when we make a larger-than-normal purchase, and this is a good thing.  The bank's systems constantly track customers' card use - amount, locations, day of time, etc. to develop a map of your spending habits - and it's when something wanders out of this map that they alert customers before serious damage can be done.  Doing so gives customers a chance to interrupt fraud as it happens, as well as minimizing losses for the bank.