Blog


Not Safe in the Cyber Streets

Seemingly every day, companies of all sizes unknowingly expose valuable information to cybercriminals around the world. No matter the industry, cyber terrorists will seek to gain control of data in exchange for large sums of money through ransomware attacks. These cybercriminals spare no mercy. Electronic Arts’ critical code exposed One recent victim of a data […]


DO NOT LET YOUR BROWSER STORE COMPANY PASSWORDS!

No one likes the Password. Clunky, frustrating, and by now, we all know they’re not particularly secure, as almost daily we hear news of cyberattacks with compromised user credentials as the root cause. But until they go away, there is a proper way to manage them. Here, are a few quick DOs and DON’Ts around […]


Why Password Reuse Makes the Case for Going Passwordless  

Businesses and individuals alike are far from doomed to live with all the inconvenience and risks posed by passwords and the management challenges that they entail.


Passwords Are not Safe, Neither is Traditional MFA.

People say Multi-Factor Authentication (MFA) is the answer. But your typical MFA isn't as safe as you think.


TraitWare® Welcomes Mark Simpson as Executive VP of Business Development

Veteran cybersecurity expert and IBM executive, Mark Simpson, brings deep knowledge, experience, and vision to the TraitWare Team.  RENO, Nev. April 22, 2021 — TraitWare, providing Real Passwordless Multi-Factor Authentication (MFA)™ and Single Sign-On (SSO) combined for simple secure login, has announced the addition of Mark Simpson to the team. As Executive Vice President of […]


TraitWare® Passwordless MFA Beats Competition for Healthcare Security

TraitWare’s patented, plug-and-play Identity & Access solution is chosen by leading Healthcare Services Company (HSC) – beating DUO and displacing RSA – because of greater security, ease of use, and cost savings. Reno, Nevada – April 20, 2021 – TraitWare® today announced that the HSC will adopt TraitWare’s passwordless authentication technology for its employees, healthcare […]


10 Ways Phishing Attacks Have Evolved and Pose a More Serious Threat

Go passwordless and adopt multi-factor authentication with single sign-on for multilayered security and guaranteed convenience.


12 Ways to Secure Your Business Email

Phishing attacks, which target your email, are skyrocketing, as cybercriminals are getting more sophisticated and better at what they do. Because of the massive adjustments that businesses, large or small, have had to make to adapt to COVID-19, vulnerabilities get overlooked, including email security.  Secure your business email by adopting these best practices: 1. Run […]


On the Tech Fusion Podcast by Citrix – How Does Remote Work Affect Cybersecurity?

A conversation about the NOW of cybersecurity – with remote work here to stay. How we can help companies to get there. The Switch Has Been Flipped – and There’s No Going Back. Coming up on the one-year anniversary of COVID-19 lockdowns, the enterprise has seen enormous change. And remote work, experts say, is likely […]


TraitWare delivers simple, secure access to Citrix Workspace

Citrix continues to empower companies to have better and more secure access to enterprise resources. Now, it has expanded its capabilities and enhanced user experience, efficiency, and security by deploying modern authentication integrations for Citrix Workspace via SAML 2.0. What is SAML 2.0? Security Assertion Markup Language (SAML) is an XML-based open standard for transferring identity […]


What Makes Small Businesses Vulnerable to Cyberattacks?

The average total cost of a data breach in the U.S. is $8.19 million, more than double the world average. Some of that cost lands squarely on the laps of small businesses, who are not safe from cyberattacks themselves. According to Verizon’s 2020 Data Breach Investigations Report (DBIR) calculations, small businesses account for almost one […]


Are You Using the Most Effective Cloud Security Controls?

No doubt enterprises have embraced the cloud, but how about optimizing their cloud security controls? It seems that many enterprises are still not using the crucial tools offered by their cloud provider to ensure tracking, better control user access, and enhance security at every turn. To get the most out of your cloud services, you […]