Is There a Benefit to Two-Factor SMS, or Is It a Waste of Time?

SMS-based two-factor authentication may not give you as much security as you think! The extra step might actually be doing more harm than if you didn’t have it. 

SMS is not always a smart way to protect your data and, in this article, we will cover exactly what makes you vulnerable if you are depending on this type of security. 

5 Google Cloud Security Best Practices

Google Cloud Platform security features cover a range of Google’s products and services, such as the popular G Suite applications. These products and services are built on one of the most secure data infrastructures in the world. But, it’s still your responsibility to make sure your Google apps security settings are set up properly. This is where these five Google Cloud security best practices come in handy.

1. Set Up Your Google Cloud Organizational Structure

When you first log in to your Google Admin console, everything will be grouped into a single organizational unit. Any settings you apply to this group will apply to all the users and devices in the organization. Planning out how you want to organize your organizational units and hierarchy before diving in will help you save time and create a more structured security strategy.

Why I Took the Time to Turn On Two-Factor Authentication

For the past few years, my dad has been encouraging me to turn on two-factor authentication (2FA) on any service that offers it. Having grown up in the social media age, I felt his requests were unwarranted.

I know social media inside and out (and I have a master’s degree to prove it). I have always taken care not to share personal information online that I wouldn’t share in person, and I regularly update my security settings across all my accounts on the internet. So, what was the big deal with turning on two-factor authentication?

Using Session Puzzling to Bypass Two-Factor Authentication

Sessions are an essential part of most modern web applications. This is why session-related vulnerabilities often have a sizable impact on the overall security of a web application. They frequently allow the impersonation of other users and can have other dangerous side effects.

What Are Session Variables?

For those not familiar with session variables, they are server-side variables whose value is tied to the current session. This means that if a user visits the website, you could store their username in the session variable as they log in and it will be available until the session expires or the user logs out. If another user logs in, that triggers a new session and the session variable will return a different username for that particular user.