Male Rep3

 

 "IT Solutions to Advance your Company"

Have IT Questions?
Call us now (888) 894-6411

Blog

TWINTEL Solutions has been serving the Orange County, Los Angeles County, Riverside County, and San Diego County, areas. Since 2005, TWINTEL has provided IT Support such as technical help desk support, computer support, and overall IT consulting to small and medium-sized businesses.

ALERT: Change Your Twitter Password, Says Twitter

ALERT: Change Your Twitter Password, Says Twitter

Twitter is recommending that all 336 million users change their passwords as soon as possible due to the discovery of an internal security flaw. While the issue has been fixed and no data breach seems to have taken place, Twitter is clearly taking this situation seriously.

On Thursday, May 3, it came to light that there was an internal log upon which an undisclosed number of account passwords were recorded without any protection. As a result, this unknown amount of passwords can no longer be considered secure, even though there is no apparent evidence that any data breach has occurred.

Twitter uses a process called hashing to protect their passwords, as many companies do. However, a bug created a log of passwords before they were hashed, leaving them fully legible. This bug has since been resolved.

In response to this situation, Twitter is being proactive and recommending that all of its users change their passwords, just in case. To do so, log in to your account in your browser, access Settings and privacy, and from there, Password. It is also a good idea to enable two-factor authentication by accessing Settings and privacy, clicking into Account. Once there, click on the “Set up login verification” button and follow the instructions. You will find yourself on a Login verification screen, where you can activate the means to generate another authentication code.

While disaster seems to be averted this time, you should not hesitate to change your password as soon as possible, and makes sure that all of your online accounts have strong passwords in place. For more information about keeping your identity safe online, call the IT professionals at TWINTEL Solutions at (888) 894-6411.

 

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, June 23 2018
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

QR-Code

Our 10 Benefits

Our 10 Benefits Whitepaper

This whitepaper will evaluate the differences between traditional technical support practices and modern managed IT practices and the pros and cons of both in regards to small and medium-sized businesses.

Download Now!   Need A Consultation?

Tag Cloud

Security Tip of the Week Best Practices Cloud Privacy Technology Business Computing Backup Hackers Network Security Malware Hosted Solutions Microsoft Google Software bgc VoIP roundup nonprofit Alert Email Managed IT Services Disaster Recovery Business Business Continuity Mobile Devices Data Outsourced IT Internet Windows 10 communications Smartphones Ransomware Hardware Innovation Browser IT Services Cybercrime Android Saving Money IT Support Computers Small Business Computer Managed IT Services Server Efficiency Office Cloud Computing Smartphone Business Management Data Backup Productivity Internet of Things BYOD Tech Term Money Windows Cybersecurity Passwords Mobile Device Management Quick Tips Managed IT Social Engineering Telephone Systems BDR Data Recovery Recovery User Tips Phishing Virtualization Hacking Law Enforcement Artificial Intelligence Vulnerability Network Mobility Work/Life Balance Communication Upgrade Save Money Collaboration Productivity How To App Firewall Wi-Fi Chrome Private Cloud Bandwidth Remote Monitoring Automation Flexibility Managed Service Provider Avoiding Downtime Budget Data Protection IT Support VPN Health Proactive IT Office 365 Social Media Miscellaneous Holiday Bring Your Own Device Two-factor Authentication Facebook Office Tips Mobile Device Compliance Password Data Breach Gadgets Identity Theft Google Drive HaaS Business Intelligence Word Operating System Safety Apps Value Redundancy Microsoft Office Remote Computing Data Security Workplace Tips Windows 10 Applications Connectivity Information Technology Black Market History Router Electronic Medical Records Spam Website Data Storage Employer-Employee Relationship Keyboard Spam Blocking Content Filtering IT Management The Internet of Things Business Owner Hiring/Firing Cleaning Document Management CES Emergency Government IT Plan Computing Infrastructure Marketing Sports Computer Care Save Time Content Management Patch Management Mobile Computing Credit Cards Physical Security HIPAA Samsung Automobile Scam Wireless Technology Windows 7 Data Management Unsupported Software Data storage Worker End of Support USB Battery Infrastructure Entertainment SaaS Comparison Servers Workers PDF Solid State Drive Update Big Data Legal OneNote Risk Management Charger YouTube Leadership Thought Leadership Workforce Telephony Politics How to Fiber-Optic eWaste Public Computer Downtime Meetings Worker Commute Practices Video Games Twitter Telecommuting User Error Frequently Asked Questions Reputation Skype Cables Unified Threat Management Wireless Criminal Voice over Internet Protocol Robot Data loss Hosted Computing Addiction Remote Work Colocation Excel Customers Start Menu Experience Laptop Windows 10s Unified Communications Techology Multi-Factor Security Inventory webinar Cache Employer Employee Relationship Tip of the week Tools Touchpad Public Cloud Shadow IT Theft IBM Trending NarrowBand Access Control Conferencing Wireless Internet Computer Accessories Hacker Windows Server 2008 Cortana Blockchain Supercomputer Lifestyle Apple Data Warehousing Authentication Netflix Wire Fraud Bluetooth Internet Exlporer Mobile Audit Google Apps Human Resources Current Events Transportation iPhone Smart Office Amazon Regulations Audiobook Professional Services Computer Fan Loyalty Staff Knowledge Nanotechnology Benefits Software Tips Monitor Scalability Paperless Office Amazon Web Services Rootkit Advertising Password Manager Hard Drives Software as a Service Troubleshooting FENG Education Chromecast Digital Signature Network Congestion Smart Tech Smart Technology Machine Learning Online Shopping Training Business Mangement Relocation Encryption Specifications Two Factor Authentication Files HBO Flash Instant Messaging HVAC Evernote Vendor Management Gmail Assessment WiFi Books Humor Screen Mirroring Users Content Accountants IT Consultant Best Practice Devices Millennials Outlook Sync Going Green Settings Search Wireless Charging Recycling Television Google Docs Hosted Solution Cast CrashOverride Virtual Reality Enterprise Content Management Thank You Password Management Congratulations NIST nonprofits Networking