![]() "The second step is to take advantage of two factor authentication (2FA) wherever it is available."Failing that, even writing passwords down can be good in some cases (just don't leave your notebook lying around). ![]()
0 Comments
Leave a Reply. |