7 Reasons you should NOT use Free Authenticator Apps for Security
And why you should use Strong MFA instead Despite the call from world leaders for strong Multi-Factor Authentication (MFA) to protect individuals and organizations against cyber-attack, the vast majority just isn’t up to snuff when it comes to security. Most of us know that security starts with Identity and Authentication – ensuring that users Are […]
Zero Trust Security & Identity and Access Management (IAM)
Time to Fix What’s Broken Zero Trust Security & Identity and Access Management need to be updated for the modern workplace. The days of Castle-and-Moat security for the organization – where everything was considered secure inside corporate perimeter walls – are over. Today, users are seldom in one place, so security must consider every identity […]
Phight the Phish with NonPhishable MFA
Something worth thinking about as cybercrime continues to grow and evolve, and as companies are looking to protect themselves and company valuables from costly attack. Cybercriminals are getting craftier with their methods. Take recent news of a Phishing attack targeting Microsoft 365 email accounts. This large-scale campaign used a relatively new method called AiTM or Adversary in the […]
Trust & Security
A People Story TRUST. It’s a people thing. Not a technology thing. People build reliable technology. Not the other way around. Choosing which cybersecurity tools you trust to implement and use starts with people. If you’re looking for a solution, you need to know what exactly they are selling, who’s behind it, what problems the […]
What is Island Hopping? How can you best protect your business from attack?
Island Hopping - NOT a Holiday Thing
You can’t have Security without Privacy
Privacy vs. Security. Can you have both? While there’s a difference, we think the two belong together – especially when it comes to Identity. While data security has become increasingly important for companies of all sizes – with the risk and severity of cyberattack steadily rising – regulations like GDPR, CCPA mean companies are also having […]
What Is Face Verification and How Does It Optimize Passwordless MFA?
How do you secure identity and transactions—especially business, financial, government transactions—in a world that is becoming more and more digital and hyperconnected? It’s time to move on from old and increasingly vulnerable authentication methods, like ID cards and the username-and-password combo, to newer methods that pose a tougher challenge for cybercriminals to get past. Today’s […]
BUSTING MYTHS: THE TRUTH ABOUT BIOMETRICS
FOR IDENTITY & ACCESS MANAGEMENT With cybercrime in today’s headlines almost daily, companies are looking to modernize security protocols. Biometrics are being widely adopted for greater security and for improved user experience. Yet some are still hesitant to make the shift. Here are a few myths about biometrics that need busting: 1. Biometric images can […]
A Paradigm Shift in IAM – The Move to Zero Trust Access
A person's identity is the first pillar in a Zero Trust framework. Achieving True Zero Trust Access requires having MFA inherent upon account creation.
Not Safe in the Cyber Streets
Seemingly every day, companies of all sizes unknowingly expose valuable information to cybercriminals around the world. No matter the industry, cyber terrorists will seek to gain control of data in exchange for large sums of money through ransomware attacks. These cybercriminals spare no mercy. Electronic Arts’ critical code exposed One recent victim of a data […]
DON’T LET YOUR BROWSER STORE COMPANY PASSWORDS!
No one likes the Password. Clunky, frustrating, and by now, we all know they’re not particularly secure, as almost daily we hear news of cyberattacks with compromised user credentials as the root cause. But until they go away, there is a proper way to manage them. Here, are a few quick DOs and DON’Ts around […]
Why Password Reuse Makes the Case for Going Passwordless
Businesses and individuals alike are far from doomed to live with all the inconvenience and risks posed by passwords and the management challenges that they entail.