Skip to content

CORPORATE INFORMATION TECHNOLOGIES

Let us show you how good I.T. can be!

  • Home
  • Who We Are
    • Our Team
  • WHAT WE DO
    • Managed Technology Services
    • Security Awareness Training
    • Security and Risk Assessment
    • Cybersecurity for Small-to-Medium Business
    • Infrastructure Development
    • Emergency Cybersecurity Incident Containment
    • Employees Working From Home
  • Resources
    • Our Blog
    • The TL/DR
    • Practically Secure
    • CIT White Papers
  • Connect with us
    • Contact us
    • Career Opportunities
  • You are here»
  • Third Party Logins: Safety Lesson...»
March 11, 2020March 10, 2020
Practically Secure

Third Party Logins: Safety Lesson 11

Don’t use third party logins. Let’s start with what is a third party login.

A third party login is where you use a different login (like Facebook) to login to another website. Facebook is the most prominent one doing it, but it isn’t the only one.

My problem with the third party logins is that it is essentially sharing credentials. You’re giving the third party access to the info and data you use on the secondary app. So maybe they say that they won’t use that data in the contract “noone” reads, but if the main company has their credentials leaked or hacked, it leaves you vulnerable to all third party logins attached too.

If you’re ok with third party logins and want to continue, all least review the ones that are attached. Again, it’s buried within settings somewhere, but they are listed (at least within Facebook). Review the list to ensure you’re still using that app. Disable or delete if you aren’t.

Stay tuned to hear more tips or find more here! Corporate Information Technologies Practically Secure Blog series.

Corporate Information Technologies provides small to mid-market organizations with expert I.T. services including compliance assessment, cybersecurity penetration tests, and comprehensive business continuity planning services. Corporate Information Technologies can help organizations, quantify, create, refine, and mitigate the risks presented by business threatening disasters in whatever form they may be disguised. 

Contact us to learn more and let us show you how good I.T. can — Don’t Gamble With Your Security

Posted by Corp-InfoTech
Tagged: cybersecuirty charlottecybersecurityhackedsharing credentialsthird party loginthird party logins

Corp-InfoTech


View all posts by Corp-InfoTech

Post navigation

Previous Previous post:
Cybersecurity and Working From Home
Next Next post:
Practical Cybersecurity tips during Coronavirus pandemic crisis

Search

Recent Posts

  • NetWalker Ransomware – What is it?
  • Supply Chain Attack: Simply Stated
  • DDoS Attacks. How Do They Affect Business?
  • Purr-fect Zoom Meeting or Not
  • ChannelPro New Year’s Special

Learn More

COVID-19 Security Help

Security Awareness Training
Employees Working From Home
CIT Logo

8801 J.M. Keynes Drive

Suite 250

Charlotte, NC 28262

Phone: 704-392-3031

Fax: 704-392-3172

Follow Us

  • facebook
  • twitter
  • linkedin
Copyright ©
1996-2021 Corporate Information Technologies, Inc. | All Rights Reserved
CORPORATE INFORMATION TECHNOLOGIES.
error: Alert: This Content is protected!