Blog


MFA and the Truth About ‘Layered’ Security

Multifactor Authentication (MFA) and Layered Security have long been recommended best practices for enterprise security. But what exactly are they? … At what point are there too many layers? And WHICH layers of security should I deploy? What is Layered Security? Layered security attempts to secure organizations by employing various tools – ideally complementary tools. […]


The LastPass Lockout – And Lessons in MFA

Angry LastPass users have taken to social media with reports that they’ve been struggling to access their accounts since the company’s security upgrade back in May. What’s more, there doesn’t seem to be a simple solution in sight. What does this have to do with MFA? The trouble began on May 9, 2023, when LastPass […]


The Supply Chain – Connectivity, Cyberthreat, and Best Practices for Cybersecurity

The digital age has brought radical change to many industries. And, as the world becomes increasingly connected, long and complex supply chains are common for companies of all sizes. While connectivity has been good for international commerce, it also comes with elevated risk – particularly for the supply chain. Regardless of size or industry, cybersecurity […]


What has happened in cybersecurity since Biden called in 2021?

Two years ago (August 25th, 2021) business leaders – including some of Silicon Valley’s biggest Tech players, water and energy companies, banking and insurance firms, and academic institutions – were summoned to the White House to discuss one of the world’s most pressing concerns: Cybersecurity. The meeting came in the wake of several cyber-attacks – […]


TraitWare Patents

TraitWare’s patented innovation is part of what makes us stand out from the competition. Find out more about our unique technology. Patented Innovations (5 Granted)* Patents Pending *US patents  (101649740, 1050388, 11068476, 11301555, 11406196, 11805121) Selected TraitWare processes (such as registration, Windows authentication, and Linux authentication) are also covered by pending US and international patent […]


7 Reasons you should NOT use Free Authenticator Apps for Security

And why you should use Strong MFA instead Despite the call from world leaders for strong Multi-Factor Authentication (MFA) to protect individuals and organizations against cyber-attack, the vast majority just isn’t up to snuff when it comes to security. Most of us know that security starts with Identity and Authentication – ensuring that users Are […]


5 Myths Around Single Sign-On

There are many misperceptions around Single Sign-On (SSO) – all of which need addressing. 5 MYTHS AROUND SSO – BUSTED: 1. SSO is not secure because if a user’s master password is compromised, an attacker could have access to all user accounts. BUST: SSO actually enhances security by reducing the number of passwords a user must […]


What is the FTC Safeguards Rule? And Will it Affect You?

What is the FTC Safeguards Rule? In 1999, The Federal Trade Commission (FTC) initiated The FTC Gramm-Leach-Biley Act’s (GLBA) Safeguards Rule in an effort to safeguard consumers and protect personal information from getting into the wrong hands. FTC Summary: “The Safeguards Rule requires financial institutions under FTC jurisdiction to have measures in place to keep customer […]


Zero Trust is No Silver Bullet

Zero trust is the Buzzword for cybersecurity today. As a result, the market is brimming with “zero trust” solutions. What is it exactly? What solutions should you choose? Making sense of it all, for any company, can be a daunting task. But what’s more, as experts and leaders continue to urge businesses to move to […]


Norton LifeLock and LastPass Breaches Raise Doubt about the Security of Password Managers  

But are the Wrong Questions Being Asked? Recent news of cyber-attacks on two major security companies has many asking, “Are password managers secure enough to protect our data?” But perhaps there’s a more important question that needs to be addressed. This week, news came of a cyber-attack on Norton LifeLock. Several thousand customers were reportedly […]


Cyber Insurance Coverage Checklist

Today, cyber insurance is difficult for most companies to navigate. Legacy cybersecurity solutions do not often meet today’s criteria. In order to ensure you’re ready to apply for cyber insurance, you’ll need to be sure you meet the requirements listed on the below cyber insurance coverage checklist: Any questions, we’re here to help!


Cybersecurity Awareness Month – 2022

Back to Basics Understand The Consequences, Reduce Risk, and Simplify Access with The Basics for Cybersecurity   As proud Champions of Cybersecurity Awareness Month, we’re doing our part to help spread awareness about the need for proper cybersecurity hygiene, while offering enterprise-class solutions for enhanced security and simplified user experience for greater adoption. The consequences […]