
Cyberattack: Where the Blame Goes. And Where Kudos Belong
There have been so many articles and posts about the recent Securities Exchange Commission (SEC) lawsuit against SolarWinds and their #ciso – and plenty written about recent breaches via the Okta platform. So much has been said about how attackers used social engineering to lure users to give up information or reset accounts. … Still, I feel like […]

Cybercrime in Schools
WHY SCHOOLS ARE PRIME TARGETS FOR CYBERATTACK, AND HOW WE CAN DO BETTER TO PROTECT THEM The University of Michigan was in the news recently following a cyberattack that caused an internet outage across all campus networks, eventually requiring password resets for all users. This is just one event amid a series of cyberattacks on […]

MFA and the Truth About ‘Layered’ Security
Multifactor Authentication (MFA) and Layered Security have long been recommended best practices for enterprise security. But what exactly are they? … At what point are there too many layers? And WHICH layers of security should I deploy? What is Layered Security? Layered security attempts to secure organizations by employing various tools – ideally complementary tools. […]

The LastPass Lockout and the Lessons learned from it
Angry LastPass users have taken to social media with reports that they’ve been struggling to access their accounts since the company’s security upgrade back in May. What’s more, there doesn’t seem to be a simple solution in sight. What does this have to do with MFA? The trouble began on May 9, 2023, when LastPass […]

Supply Chain – Connectivity, and Best Practices for Cybersecurity
The digital age has brought radical change to many industries. And, as the world becomes increasingly connected, long and complex supply chains are common for companies of all sizes. While connectivity has been good for international commerce, it also comes with elevated risk – particularly for the supply chain. Regardless of size or industry, cybersecurity […]

What has happened in cybersecurity since Biden called in 2021?
Two years ago (August 25th, 2021) business leaders – including some of Silicon Valley’s biggest Tech players, water and energy companies, banking and insurance firms, and academic institutions – were summoned to the White House to discuss one of the world’s most pressing concerns: Cybersecurity. The meeting came in the wake of several cyber-attacks – […]

TraitWare Patents
TraitWare’s patented innovation is part of what makes us stand out from the competition. Find out more about our unique technology. Patented Innovations (6 Granted)* Patents Pending *US patents (101649740, 1050388, 11068476, 11301555, 11406196, 11805121) Selected TraitWare processes (such as registration, Windows authentication, and Linux authentication) are also covered by pending US and international patent […]

7 Reasons you should NOT use Free Authenticator Apps
And why you should use Strong MFA instead Despite the call from world leaders for strong Multi-Factor Authentication (MFA) to protect individuals and organizations against cyber-attack, the vast majority just isn’t up to snuff when it comes to security. Most of us know that security starts with Identity and Authentication – ensuring that users Are […]

What is the FTC Safeguards Rule? And Will it Affect You?
What is the FTC Safeguards Rule? In 1999, The Federal Trade Commission (FTC) initiated The FTC Gramm-Leach-Biley Act’s (GLBA) Safeguards Rule in an effort to safeguard consumers and protect personal information from getting into the wrong hands. FTC Summary: “The Safeguards Rule requires financial institutions under FTC jurisdiction to have measures in place to keep customer […]

Cyber Insurance Coverage Checklist
Today, cyber insurance is difficult for most companies to navigate. Legacy cybersecurity solutions do not often meet today’s criteria. In order to ensure you’re ready to apply for cyber insurance, you’ll need to be sure you meet the requirements listed on the below cyber insurance coverage checklist: Any questions, we’re here to help!

Enhanced Security and Simplicity for Software Development Community
Zero Trust Multi-Factor Authentication (MFA) and Single Sign-On (SSO) Combined for Seamless User Experience and Secure Access to GitLab RENO, NEVADA, USA, October 3, 2022 /EINPresswire.com/ — GitLab Inc., provider of The One DevOps Platform, and TraitWare Inc., providing native passwordless MFA and SSO for enterprise login, today announced their partnership, which delivers simpler, secure access for […]

MFA Fatigue – What We Learned From the Uber Breach
What Happened, and How Can We Prevent Attacks Like these? Not All MFA Is Created Equal The recent cyber-attack on Uber has had the tech community buzzing. The incident, an example of an attack method called MFA Fatigue, brings up an essential point about MFA that all individuals and organizations need to know: Not All MFA […]