article thumbnail

How to Prevent Phishing Attacks with Multi-Factor Authentication

Tech Republic Security

Learn how to protect yourself and your sensitive information from phishing attacks by implementing multi-factor authentication.

article thumbnail

How to set up passwordless SSH authentication for Ubuntu Server

Tech Republic Security

Learn how to enable passwordless SSH authentication on both Linux and macOS.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Offer Secure IVR Banking and Authenticate Callers

Tech Republic Security

Discover how to safeguard IVR banking from hackers and implement secure authentication methods for customer protection. Find out how these digital alternatives benefit both customers and agents.

article thumbnail

How to move Google Authenticator from one iPhone or Android device to another

Tech Republic Security

If you migrated to a different iPhone or Android device and need to transfer Google Authenticator to the new hardware, follow these steps.

article thumbnail

Your Guide to Using Conversational Marketing to Drive Demand Generation

Conversations have always been at the heart of our most authentic relationships. This guide will examine the market forces at play, shifting buyer trends, what conversational marketing is, how to leverage it, and the tactics involved in adopting conversational marketing for a B2B demand generation strategy.

article thumbnail

How to secure your GitHub account with two-factor authentication

Tech Republic Security

GitHub wants you to protect your account with the right type of authentication. The post How to secure your GitHub account with two-factor authentication appeared first on TechRepublic.

article thumbnail

How To Use SCP (Secure Copy) With SSH Key Authentication

Tech Republic Security

Here's how to use the secure copy command, in conjunction with ssh key authentication, for an even more secure means of copying files to your remote Linux servers.

article thumbnail

4 HR Priorities for 2025 to Supercharge Your Employee Experience

Speaker: Carolyn Clark and Miriam Connaughton

Forget predictions, let’s focus on priorities for the year and explore how to supercharge your employee experience. Join Miriam Connaughton and Carolyn Clark as they discuss key HR trends for 2025—and how to turn them into actionable strategies for your organization.