When Cybersecurity Gets Personal
I was a Victim of the Change Healthcare Breach -By Herbert Spencer – TraitWare Sometimes it’s frustrating being an innovator in cybersecurity. A few days ago, I received a letter from Change Healthcare, notifying me that my personal information had likely been compromised in a recent data breach – the one that affected millions of […]
Enterprise Cybersecurity: Practice vs. Risk
Are We Getting It Wrong? Due to the rising severity and frequency of cyber-attacks, Enterprise spending on cybersecurity is also rising worldwide. But debate is heating around which security methods we should employ. Where are organizations focusing their efforts, and where is the most risk? According to experts, companies may not be getting their priorities […]
The Problem with Passkeys
There has been a lot of talk about Passkeys. Are they right for you and your company? Why the pushback? Let’s have a look. What are Passkeys? Passkeys are credentials that replace passwords, relying on public key cryptography based on the WebAuthN protocol. The public key is stored with the company that creates your account, […]
Privacy & Cybersecurity Compliance Deadlines – 2024
What Privacy and Security Mean for Companies With Data Privacy Week coming up soon, we’re thinking about the important symbiotic relationship between privacy and security, and ahead to some pending deadlines for cybersecurity and privacy compliance. How can company leaders best navigate the waters and enjoy peace of mind? Here are a few upcoming privacy and security […]
Improved Cybersecurity and Ease of Use for MSPs
TraitWare, pioneering modern Passwordless Multi-Factor Authentication (MFA) and adaptive Identity and Access Management (IAM) has announced its strategic partnership with the Acronis CyberApp platform, revolutionizing cybersecurity for Managed Service Providers (MSPs) and their customers. This collaboration will deliver cutting-edge Phishing-Resistant Passwordless MFA and Single Sign-On (SSO) capabilities to Acronis MSPs, to reduce cyber risk and […]
Cyberattack: Where the Blame Goes. And Where Kudos Belong
There have been so many articles and posts about the recent Securities Exchange Commission (SEC) lawsuit against SolarWinds and their #ciso – and plenty written about recent breaches via the Okta platform. So much has been said about how attackers used social engineering to lure users to give up information or reset accounts. … Still, I feel like […]
Cybercrime in Schools
WHY SCHOOLS ARE PRIME TARGETS FOR CYBERATTACK, AND HOW WE CAN DO BETTER TO PROTECT THEM The University of Michigan was in the news recently following a cyberattack that caused an internet outage across all campus networks, eventually requiring password resets for all users. This is just one event amid a series of cyberattacks on […]
Supply Chain – Connectivity, and Best Practices for Cybersecurity
The digital age has brought radical change to many industries. And, as the world becomes increasingly connected, long and complex supply chains are common for companies of all sizes. While connectivity has been good for international commerce, it also comes with elevated risk – particularly for the supply chain. Regardless of size or industry, cybersecurity […]
TraitWare Patents
TraitWare’s patented innovation is part of what makes us stand out from the competition. Find out more about our unique technology. Patented Innovations (6 Granted)* Patents Pending *US patents (101649740, 1050388, 11068476, 11301555, 11406196, 11805121) Selected TraitWare processes (such as registration, Windows authentication, and Linux authentication) are also covered by pending US and international patent […]
7 Reasons you should NOT use Free Authenticator Apps
And why you should use Strong MFA instead Despite the call from world leaders for strong Multi-Factor Authentication (MFA) to protect individuals and organizations against cyber-attack, the vast majority just isn’t up to snuff when it comes to security. Most of us know that security starts with Identity and Authentication – ensuring that users Are […]
Cyber Insurance Coverage Checklist
Today, cyber insurance is difficult for most companies to navigate. Legacy cybersecurity solutions do not often meet today’s criteria. In order to ensure you’re ready to apply for cyber insurance, you’ll need to be sure you meet the requirements listed on the below cyber insurance coverage checklist: Any questions, we’re here to help!
MFA Fatigue – What We Learned From the Uber Breach
What Happened, and How Can We Prevent Attacks Like these? Not All MFA Is Created Equal The recent cyber-attack on Uber has had the tech community buzzing. The incident, an example of an attack method called MFA Fatigue, brings up an essential point about MFA that all individuals and organizations need to know: Not All MFA […]