crn5000-inc2015 BPTW logo
Contact us today!
(918) 770-8738
 
 

Integrated Business Technologies Blog

Integrated Business Technologies has been serving the Broken Arrow area since 2007, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

ALERT: Change Your Twitter Password, Says Twitter

Twitter is recommending that all 336 million users change their passwords as soon as possible due to the discovery of an internal security flaw. While the issue has been fixed and no data breach seems to have taken place, Twitter is clearly taking this situation seriously.

On Thursday, May 3, it came to light that there was an internal log upon which an undisclosed number of account passwords were recorded without any protection. As a result, this unknown amount of passwords can no longer be considered secure, even though there is no apparent evidence that any data breach has occurred.

Twitter uses a process called hashing to protect their passwords, as many companies do. However, a bug created a log of passwords before they were hashed, leaving them fully legible. This bug has since been resolved.

In response to this situation, Twitter is being proactive and recommending that all of its users change their passwords, just in case. To do so, log in to your account in your browser, access Settings and privacy, and from there, Password. It is also a good idea to enable two-factor authentication by accessing Settings and privacy, clicking into Account. Once there, click on the “Set up login verification” button and follow the instructions. You will find yourself on a Login verification screen, where you can activate the means to generate another authentication code.

While disaster seems to be averted this time, you should not hesitate to change your password as soon as possible, and makes sure that all of your online accounts have strong passwords in place. For more information about keeping your identity safe online, call the IT professionals at Integrated Business Technologies at (918) 770-8738.

 

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 20 June 2018
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      freeconsultation
       

      Tag Cloud

      Security Technology Tip of the Week Privacy Managed Service Provider Business Management Cloud Internet Microsoft Saving Money Business Computing Productivity Best Practices Workplace Tips IT Services Hosted Solutions Backup Hackers Email Mobile Devices Malware Software IT Support Business Small Business Hardware Network Data Communication Server Smartphones Upgrade Business Continuity VoIP Windows Mobile Device Management Disaster Recovery Google Virtualization Computer Efficiency Microsoft Office Miscellaneous Innovation Mobile Office Vendor Management Holiday Gadgets Social Media Outsourced IT Mobile Computing BYOD Android Smartphone User Tips Quick Tips Passwords Browser Network Security WiFi Data Backup Windows 10 Remote Monitoring Ransomware Bring Your Own Device Spam Best Practice Internet of Things The Internet of Things Managed IT services Trending Wireless Technology Operating System Apple Tech Term Remote Computing Alert Users Data Management Content Filtering Data Recovery Going Green Artificial Intelligence History Gmail Firewall Save Money IT Consultant Encryption Printer Tech Support Current Events Information Technology Managed IT Big Data App Office Analytics Customer Relationship Management IT Solutions Unified Threat Management Lithium-ion Battery Windows 8 Cloud Computing Router Antivirus Document Management Humor Applications Saving Time Paperless Office Avoiding Downtime Employer-Employee Relationship Maintenance Hard Drives Facebook Compliance Marketing Automation Excel Office Tips Retail Phishing IT service Mobile Device Digital Payment Chrome Business Growth VPN Apps Risk Management Application Managed IT Services Virus Website Customer Service Hacking Computers Fax Server Phone System Outlook Health Collaboration Cybersecurity Two-factor Authentication Budget Data Security Computer Repair Proactive IT Regulations Recovery Inbound Marketing Mouse Money Bandwidth Running Cable Social Net Neutrality Licensing Infrastructure PowerPoint Social Networking Wi-Fi Unified Communications Training Tablet Office 365 iPhone User Error Password Government Project Management Co-Managed IT Administration Augmented Reality Presentation Mobility Business Owner Sports Hacker User Point of Sale Programming Tip of the week Scam Twitter Company Culture Analyitcs Education Safety Specifications Hosted Solution IBM Settings Flexibility Cost Management Wireless Data storage Cybercrime File Sharing Save Time Wearable Technology Robot Hiring/Firing Vulnerability Productivity Printing Display Alerts End of Support LiFi HIPAA Computing Statistics Data loss Help Desk Redundancy Intranet Competition Business Intelligence Network Congestion Recycling eWaste Downtime Internet Exlporer Smart Technology Search Mobile Security Files Virtual Desktop USB Piracy Samsung IoT Distributed Denial of Service Legal Online Currency Troubleshooting Debate Windows 10 Hotspot Experience Machine Learning Multi-Factor Security Heating/Cooling Alt Codes Computer Accessories Chatbots Crowdfunding Star Wars Managed IT Service Consumers YouTube Language Private Cloud Google Calendar Typing Techology Identity Utility Computing Scheduling Software Tips Break Fix IP Address Google Drive Server Management Computing Infrastructure How To Public Cloud Legislation Refrigeration Cryptocurrency Disaster Touchscreen Disaster Resistance Healthcare Dark Web Google Docs Cooperation Sync Bitcoin Digital Signature IT Consulting Motherboard Memory Hard Drive Data Warehousing communications Patch Management Staff Laptop Modem Mobile Device Managment Software as a Service Hacks Conferencing Cache IT Support Microsoft Excel Documents Data Breach Entrepreneur Operations Halloween Cookies Macro PC Care Technology Tips Undo Value People Management Blockchain 5G PDF Virtual Reality Technology Laws eBay Virtual Private Network Scary Stories Nanotechnology Leadership Travel Comparison Remote Support Streaming Media Enterprise Resource Planning New Additions Permissions Monitors Skype SaaS Unified Threat Management Deep Learning Print Server Gaming Console Text Messaging IT Technicians Screen Reader BDR Black Friday Domains Google Wallet Work Station LinkedIn Mobile Congratulations Assessment Fraud Fun Writing Access Control Word Law Firm IT Video Surveillance Mirgation Smart Tech Identity Theft Cyber Monday Public Speaking Drones Windows 8.1 Update Best Available Buisness Managing Stress IT Management Cortana Social Engineering Telephony SharePoint Identities Business Technology Storage Connectivity Backups Environment CIO Enterprise Content Management Adminstration Network Management Knowledge Downloads Solid State Drive Bluetooth 3D Networking Migration

      Top Blog

      Basically, any machine that uses fans and vents to cool itself can overheat if airflow is restricted. If you have used a laptop on your lap for an extended session, then you know what we are talking about when the computer becomes hot to the touch. Every portable device is designed a little diffe...
      QR-Code