Mycena theme MyCena, Author at MyCena® - Page 26 of 44

BLOG

Read our blog articles, product news and announcements.

New MyCena extension allows automatic filling of credentials

We are very excited to introduce the new auto-fill feature for MyCena Desk Center (MDC) application.

No need to copy and paste the login or password from your application to a http or https webpage anymore. Follow those steps and your login information will be automatically filled in.

How to use the auto-fill feature?

1- Download ( first time only) the MyCena Desk Center extension on your browser.

      • Firefox : https://addons.mozilla.org/fr/firefox/addon/mycena-desk-center-extension

     • Chrome : https://chrome.google.com/webstore/detail/mycena-desk-center-extens/ihmaefbmifmbbcobcnfbgofllgbjbfpn

      • Safari : Safari (coming soo)

2- Click on the extension icon then enter your e-mail address or your username in the field.

3a- Go to the menu of your MDC application, click on Connect Extension.

3b (optional) - If you received a code in the app, click on the MDC extension icon and enter the code in the window.

4- Once your application and extension are connected, all you have to do is go to one of your credentials on the MDC application and click on the 'go to' icon. If the address is a web login page, the fields will be automatically filled in.

NOTE: If 'see password' and 'copy password' are disabled in your MDC application, you can't know your own passwords. The only way for you to login is open your MDC application and click the 'go to' button. Because you don't know your own passwords, you are safe from phishing attacks.

A major U.S. oil pipeline was knocked offline earlier this month by a cyber attack originating in Eastern Europe. The Colonial Pipeline, which supplies around half of the East Coast’s fuel, announced it was the victim of an attack on May 7th. The attackers used ransomware which forced The Colonial Pipeline Company to take their systems offline and halt the delivery of fuel, causing President Biden to announce a regional state of emergency in the days following. Reports vary on exactly how the company dealt with the ransomware, however, CEO Joseph Blount confirmed that a Bitcoin payment worth around $4.4 million was made.

The Colonial Pipeline attack is the latest to show that ransomware is increasingly encroaching on everyday life, say Vice. According to many experts it was only a matter of time before an attack like this hit, and millions felt the effects. Rob Lee, CEO of security firm Dragos, commented that “this is the largest impact on the energy system in the United States we've seen from a cyberattack.” In the recent past ransomware has been responsible for compromising services provided by hospitals, police databases, and now energy providers, with governments concerned for their critical infrastructure.

An executive order was issued by the Biden Administration on May 12th which aims to increase the level of cybersecurity in the United States. Seen by many as a reaction to the Colonial Pipeline attack, the order has actually been in the works since Biden took office, mostly as a reaction to the SolarWinds attack in 2020. Most of the sections of the order are directed at protecting U.S. government systems, stating that zero-trust models and two-factor authentication should be used wherever possible. Other measures include better collaboration between departments against cyber threats, and more stringent tests on software safety.

The Transport Salaried Staffs’ Association (TSSA) union has hit out at West Midlands Trains after an employee phishing test took place. Around 2,500 employees were sent an email which thanked them for their work during the pandemic and promised a bonus, however, those employees who clicked a link within the email were then told that they had failed a company security test. The message said, “This was a test designed by our IT team to entice you to click the link and used both the promise of thanks and financial reward.” Phishing is a huge risk to companies everywhere and employee awareness tests are common practice, however, the TSSA called the exercise “cynical and shocking.”

Around 15% of all UK adults use their pet’s name in their password, a survey from the National Cyber Security Centre (NCSC) has revealed. The report has come at a time when remote working has become commonplace, putting extra importance on password security. The results of the survey showed that pets’ names were the most common form of password at 15%, followed by family members’ names (14%), important dates (13%), and favourite sports teams (6%). Along with these results, the report included examples of the most commonly used, and most predictable, passwords.