Author: Elizabeth Perry


7 Reasons you should NOT use Free Authenticator Apps for Security

And why you should use Strong MFA instead Despite the call from world leaders for strong Multi-Factor Authentication (MFA) to protect individuals and organizations against cyber-attack, the vast majority just isn’t up to snuff when it comes to security. Most of us know that security starts with Identity and Authentication – ensuring that users Are […]


5 Myths Around Single Sign-On

There are many misperceptions around Single Sign-On (SSO) – all of which need addressing. 5 MYTHS AROUND SSO – BUSTED: 1. SSO is not secure because if a user’s master password is compromised, an attacker could have access to all user accounts. BUST: SSO actually enhances security by reducing the number of passwords a user must […]


What is the FTC Safeguards Rule? And Will it Affect You?

What is the FTC Safeguards Rule? In 1999, The Federal Trade Commission (FTC) initiated The FTC Gramm-Leach-Biley Act’s (GLBA) Safeguards Rule in an effort to safeguard consumers and protect personal information from getting into the wrong hands. FTC Summary: “The Safeguards Rule requires financial institutions under FTC jurisdiction to have measures in place to keep customer […]


Zero Trust is No Silver Bullet

Zero trust is the Buzzword for cybersecurity today. As a result, the market is brimming with “zero trust” solutions. What is it exactly? What solutions should you choose? Making sense of it all, for any company, can be a daunting task. But what’s more, as experts and leaders continue to urge businesses to move to […]


Norton LifeLock and LastPass Breaches Raise Doubt about the Security of Password Managers  

But are the Wrong Questions Being Asked? Recent news of cyber-attacks on two major security companies has many asking, “Are password managers secure enough to protect our data?” But perhaps there’s a more important question that needs to be addressed. This week, news came of a cyber-attack on Norton LifeLock. Several thousand customers were reportedly […]


Cyber Insurance Coverage Checklist

Today, cyber insurance is difficult for most companies to navigate. Legacy cybersecurity solutions do not often meet today’s criteria. In order to ensure you’re ready to apply for cyber insurance, you’ll need to be sure you meet the requirements listed on the below cyber insurance coverage checklist: Any questions, we’re here to help!


TraitWare and Brightline Insurance Join Forces to Ensure Companies Meet Today’s Strict Budgetary and Security Requirements for Cyber Insurance

Cutting-edge technology and deep industry expertise combine to give customers superior security controls along with the necessary tools to manage budgets responsibly TraitWare, providing Phishing-Resistant Passwordless Multi-Factor Authentication (MFA) and Single Sign-On (SSO) for enterprise login, and Brightline – cyber-liability specialists helping businesses navigate the ever-evolving and increasingly important world of cyber insurance, have announced […]


Cybersecurity Awareness Month – 2022

Back to Basics Understand The Consequences, Reduce Risk, and Simplify Access with The Basics for Cybersecurity   As proud Champions of Cybersecurity Awareness Month, we’re doing our part to help spread awareness about the need for proper cybersecurity hygiene, while offering enterprise-class solutions for enhanced security and simplified user experience for greater adoption. The consequences […]


GitLab Inc. and TraitWare Deliver Enhanced Security and Simplicity for the Software Development Community

Zero Trust Multi-Factor Authentication (MFA) and Single Sign-On (SSO) Combined for Seamless User Experience and Secure Access to GitLab RENO, NEVADA, USA, October 3, 2022 /EINPresswire.com/ — GitLab Inc., provider of The One DevOps Platform, and TraitWare Inc., providing native passwordless MFA and SSO for enterprise login, today announced their partnership, which delivers simpler, secure access for […]


MFA Fatigue – What We Learned From the Uber Breach

What Happened, and How Can We Prevent Attacks Like these? Not All MFA Is Created Equal The recent cyber-attack on Uber has had the tech community buzzing. The incident, an example of an attack method called MFA Fatigue, brings up an essential point about MFA that all individuals and organizations need to know: Not All MFA […]


CYBER INSURANCE WON’T PAY

Unless You Do These Things First Company budgets are now being firmed up for 2023 and, as the frequency, severity, and cost of cyber-attacks increase dramatically, it’s no wonder that enterprise demand for cyber insurance has also skyrocketed. But, while cyber insurance may seem like a relatively easy way for a company to plug in […]


Zero Trust Security & Identity and Access Management (IAM)

Time to Fix What’s Broken Zero Trust Security & Identity and Access Management need to be updated for the modern workplace. The days of Castle-and-Moat security for the organization – where everything was considered secure inside corporate perimeter walls – are over. Today, users are seldom in one place, so security must consider every identity […]