How Can You Optimize Passwordless Authentication?
Have you gone passwordless yet? Making the switch may be the best security move you can make today, because passwords are becoming even less secure, especially when you consider users’ tendency to have poor password security habits. For example, 52 percent of users reuse the same password for multiple accounts, and 59 percent of American […]
ZeroTrust and work from Mars, By Chris Werpy, COO, PlanetOne
As our Planet made the shift to work from wherever, remote access exploded in numbers and speed, with capacity taking the lead. Looking ahead, it’s time to determine how to not only keep the lights on, but to drive increased productivity without compromising security. Is the environment we work in today designed for the future, […]
Why Companies do not want to Go Passwordless
Addressing the Top 4 Reasons for Hesitation Studies have shown an increased appetite among consumers for multi-factor authentication, including biometrics as a replacement for the username and password login method, and evidence is clear that credential-based login poses the number one threat for security breaches. Experts and tech writers have been saying that we need to “break […]
Cyber Resiliency for Small Businesses: Techniques and Tips
Cyber Resiliency for Small Businesses: Techniques and Tips In the context of cybersecurity, resiliency is all about how organizations bounce back from an incident that involves the interconnection of multiple domains such as cybersecurity, business continuity, and organizational operations. You need to be cyber resilient to adapt and continue to deliver services or provide products […]
How Tech has Evolved. And How it Really Hasn’t.
It’s Time to Fix What’s Been Broken From the Get-Go As humans, we’ve evolved a fair amount. But Technology is another animal altogether. Taking a look at our infographic, the technological shifts we’ve witnessed since the 1950s are nothing short of mind-blowing. From pen and paper and a phone to today’s superpowered mobile devices, AI, […]
Beware of Tycoon – the Ransomware Targeting Windows and Linux Systems
Beware of Tycoon—the Ransomware Targeting Windows and Linux Systems. Windows and Linux systems are in the cyber-crosshairs of a recently uncovered ransomware, in what appears to be a targeted campaign. Tycoon is a multi-platform Java ransomware that is deployed in the form of a Trojanized Java Runtime Environment (JRE) and leverages an obscure Java image […]
Best Practices for SMEs’ Data Security
Data Security at SME’s are targeted by cyber attackers for their lack of resources or expertise to effectively protect their data. Managed security services provider Alert Logic estimates that small businesses make up 58% of malware attack victims, and that 94% of these attacks are carried out through malware or phishing emails disguised as bills, […]
How to get Free Passwordless Login Security
TraitWare® offers FREE Passwordless Login Security to Citrix customers First and foremost, the health and safety of friends and families takes precedence. With the developing changes surrounding the COVID-19 emergency, companies are adopting rapid procedures to help protect their employees. The most immediate change that most companies are adopting is a shift to working remotely. […]
DUH, IT IS THE ECONOMY
Most of you who read these articles are the techie/nerdie/geekie types. I am the guy who sits across the table from you, and to be perfectly honest, I really don’t understand much of what you are saying. That being said, I am very concerned, interested and focused on the bottom line. If there is an […]
How Secure is Passwordless Authentication
As humanity further progresses in the digital era, computer passwords, which were used to ensure our security on the world wide web have become liabilities. Passwords are weak links that are often targeted by cybercriminals. From time to time, we hear about massive breaches which compromise millions of user passwords from big platforms. The era […]
5 Tips for Better WordPress Login Security on Your Sign In Page
WordPress Login Security One common vulnerability among WordPress login security is the weakness of the login page. Brute force attacks and hacks often start with the weakest link; login credentials. Here are some tips to implement in your WordPress login page increasing security keeping cybercriminals at bay. 1. Change Your Login Page URL For instance […]