Ophtek
  • Office IT Services
    • Total IT Coverage
    • Office IT Security
    • HIPAA Compliant IT Services
    • Data Backup and Recovery
    • Office Network
    • Cloud Services for Business
    • Repairs and Support
    • IT Asset Management and Reporting
    • Microsoft 365 Consulting
  • Company
    • About
    • Team
    • Computers 4 Classrooms
  • Contact
  • Blog
  • Client Portal
    • Request Help
Select Page
CircleCI Hacked: Cookie Theft Bypasses 2FA Process

CircleCI Hacked: Cookie Theft Bypasses 2FA Process

by Ophtek, LLC | Mar 14, 2023 | cookies, Google Authenticator, Ophtek, Phishing, Two Factor Authentication

Two-factor authentication (2FA) is there to provide a high level of security, but what happens when this process is compromised? CircleCI is a platform used by software developers to build, test and implement code. Therefore, due to the amount of confidential and...
Database of 26 Million Stolen Passwords Discovered

Database of 26 Million Stolen Passwords Discovered

by Ophtek, LLC | Jun 22, 2021 | Cyber Security, Data Security, Ophtek, Password Security, Two Factor Authentication, Updates

Passwords are one of the most common security measures, but they’re still considered a risk. And 26 million stolen passwords have just been found. We all use passwords on a regular basis throughout our working day. Logging on to remote servers and online platforms all...
SMS Authentication Isn’t as Secure as You Thought

SMS Authentication Isn’t as Secure as You Thought

by Ophtek, LLC | Mar 10, 2020 | Ophtek, Security Threats, SMS Authentication, Two Factor Authentication

SMS is one of the most popular ways to confirm two-factor authorization. Accordingly, it’s been adopted by countless organizations. But is it secure? Two-factor authorization is one of the simplest ways to maximize security. Instead of, for example, simply entering a...

Latest IT Articles

Ophtek Presenting at CDA: Cyber Security, AI Threats and HIPAA Compliance

Ophtek Presenting at CDA: Cyber Security, AI Threats and HIPAA Compliance

Why Every Business Should Review Their Cloud Users

Why Every Business Should Review Their Cloud Users

Hackers Are Turning Trusted Login Systems Against You

Hackers Are Turning Trusted Login Systems Against You

How We Help Businesses

Get the Latest IT News

Success!

Subscribe

  • Follow
  • Follow
  • Follow