Chapters
Microsoft Security
Microsoft Security
0:00
Microsoft Security
0:00
Background
Background
5:21
Background
5:21
Table stakes
Table stakes
10:48
Table stakes
10:48
The 2 main ways are...
The 2 main ways are...
13:15
The 2 main ways are...
13:15
What is the best way for bad guys to get your data?
What is the best way for bad guys to get your data?
13:32
What do Bad Actors do with 15,000,000,000 Records?
What do Bad Actors do with 15,000,000,000 Records?
20:16
Lightning review - phishing signs
Lightning review - phishing signs
22:01
To-don't List
To-don't List
32:32
To-don't List
32:32
How do we lock up stuff in cyberspace?
How do we lock up stuff in cyberspace?
37:22
Lost your house key? What do you do?
Lost your house key? What do you do?
41:50
Password hall of shame
Password hall of shame
44:23
Password hall of shame
44:23
Good password managers
Good password managers
47:49
Good password managers
47:49
How else can you use a password manager?
How else can you use a password manager?
51:10
Demos
Demos
53:42
Demos
53:42
Two-factor authentication
Two-factor authentication
54:23
Use an app or token for 2FA, because... Text messaging is not secure
Use an app or token for 2FA, because... Text messaging is not secure
56:32
Go-Do's Review
Go-Do's Review
58:08
Go-Do's Review
58:08
Resources
Resources
59:40
Resources
59:40
Sync to video time
Description
72Likes
5,091Views
2020Nov 3
Transcript
Follow along using the transcript.
Show transcript
Microsoft Security Community
33.7K subscribers
Transcript
NaN / NaN
Show more