Is Bitwarden's 2FA Code a Security Risk?
Bitwarden and many other password managers allow you to save second-factor TOTP codes alongside your passwords. Whilst convenient, is this a security risk that puts all of your eggs in one basket and defeats the purpose of having multi-factor authentication in the first place? Should you use this feature at all, or store your TOTP codes somewhere else?
💬 *Follow* *Me*
https://twitter.com/AndrewMRQuinn
Video timestamps:
0:00 - Introduction
0:51 - Defining Multi-Factor Authentication
2:49 - The Airport Analogy
3:32 - How This Works on the Internet
5:14 - Do We Still Need Multi-Factor Authentication?
6:26 - Should You Use Bitwarden's TOTP Feature?
#MFA #Bitwarden #TOTP #PasswordManager #MultiFactorAuthentication #2FA #TwoStepVerification #CyberSecurity
Видео Is Bitwarden's 2FA Code a Security Risk? канала Pro Tech Show
💬 *Follow* *Me*
https://twitter.com/AndrewMRQuinn
Video timestamps:
0:00 - Introduction
0:51 - Defining Multi-Factor Authentication
2:49 - The Airport Analogy
3:32 - How This Works on the Internet
5:14 - Do We Still Need Multi-Factor Authentication?
6:26 - Should You Use Bitwarden's TOTP Feature?
#MFA #Bitwarden #TOTP #PasswordManager #MultiFactorAuthentication #2FA #TwoStepVerification #CyberSecurity
Видео Is Bitwarden's 2FA Code a Security Risk? канала Pro Tech Show
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![Two Factor Authentication - More Security, Less Effort](https://i.ytimg.com/vi/z_RmcLzrUng/default.jpg)
![Building the ultimate USB boot drive](https://i.ytimg.com/vi/ioIxdKr_Ip8/default.jpg)
![SRE, DevOps, Kubernetes & Chaos Engineering ft. Rich Burroughs](https://i.ytimg.com/vi/ki4aTpemsH0/default.jpg)
![Heartbleed - What Happened? A Bug That Nearly Broke the Internet](https://i.ytimg.com/vi/eCGKf1XD-ME/default.jpg)
![Infrastructure as Code Explained](https://i.ytimg.com/vi/iHK65awT6zs/default.jpg)
![What Is a VPN and Should You Use One?](https://i.ytimg.com/vi/IZ4885mgQXo/default.jpg)
![7 Things to Know Before Using Office 365](https://i.ytimg.com/vi/yioOE6mIo0w/default.jpg)
![More Useful Tools for IT Pros](https://i.ytimg.com/vi/tW8JGQPo58Y/default.jpg)
![Big Vs Small Public Cloud Providers](https://i.ytimg.com/vi/LJomGBuBDaU/default.jpg)
![Serverless Architecture Explained](https://i.ytimg.com/vi/Y6iY279lBqM/default.jpg)
![The New Windows Terminal: Command Line Just Got Better](https://i.ytimg.com/vi/mtMjkvn9kSw/default.jpg)
![Is the Cloud Secure Enough?](https://i.ytimg.com/vi/QNpe2wUDb0o/default.jpg)
![Windows 10 Can Run Linux!? | Windows Subsystem for Linux](https://i.ytimg.com/vi/lhREST4uiqw/default.jpg)
![Hacking (and Protecting) a Windows Network with Bad Physical Security](https://i.ytimg.com/vi/dQli0wqyrME/default.jpg)
![An Open Source Exchange Server | Grommunio](https://i.ytimg.com/vi/pgshtE0eHAs/default.jpg)
![You Should Learn PowerShell](https://i.ytimg.com/vi/tBqN8NJLXyE/default.jpg)
![Best FREE Vulnerability Scanner: Nessus Vs OpenVAS (Greenbone)](https://i.ytimg.com/vi/sEzN2U4Pqcs/default.jpg)
![Setting Traps for Hackers](https://i.ytimg.com/vi/rBa8i8GkHnc/default.jpg)
![Hyperconverged Infrastructure Explained](https://i.ytimg.com/vi/xZvLvKv1rjs/default.jpg)
![EDR, MDR & XDR Explained](https://i.ytimg.com/vi/z983AM8etCA/default.jpg)
![How to Protect Your Devices from Hackers](https://i.ytimg.com/vi/8lFxRO5qerM/default.jpg)