
You can’t have Security without Privacy
Privacy vs. Security. Can you have both? While there’s a difference, we think the two belong together – especially when it comes to Identity. While data security has become increasingly important for companies of all sizes – with the risk and severity of cyberattack steadily rising – regulations like GDPR, CCPA mean companies are also having […]

LastPass Says No Passwords Compromised in Security Scare …
But you should ditch that master password anyway. And it’s easier than you may think. Last week Tuesday, another security scare hit cyberspace and password manager LastPass. The scare points, once again, to the fact that passwords are risky. Several users reported receiving email alerts from LastPass, warning that unauthorized attempts had been made to […]

BUSTING MYTHS: THE TRUTH ABOUT BIOMETRICS
FOR IDENTITY & ACCESS MANAGEMENT With cybercrime in today’s headlines almost daily, companies are looking to modernize security protocols. Biometrics are being widely adopted for greater security and for improved user experience. Yet some are still hesitant to make the shift. Here are a few myths about biometrics that need busting: 1. Biometric images can […]

What is Real Passwordless MFA?
What is Real Passwordless MFA and Why is it Essential for Enterprise Security? In light of the sharp rise in cyber attacks worldwide – from ransomware to phishing scams to man-in-the-middle attacks – we’ve been told by the likes of Microsoft, countless cybersecurity experts, and even the President of the United States, that it’s time […]

Not Safe in the Cyber Streets
Seemingly every day, companies of all sizes unknowingly expose valuable information to cybercriminals around the world. No matter the industry, cyber terrorists will seek to gain control of data in exchange for large sums of money through ransomware attacks. These cybercriminals spare no mercy. Electronic Arts’ critical code exposed One recent victim of a data […]

Why Passwords shouldn’t be stored in the Browser
No one likes the Password. Clunky, frustrating, and by now, we all know they’re not particularly secure, as almost daily we hear news of cyberattacks with compromised user credentials as the root cause. But until they go away, there is a proper way to manage them. Here, are a few quick DOs and DON’Ts around […]

Traditional MFA and Passwords are not cyber secure
People say Multi-Factor Authentication (MFA) is the answer. But your typical MFA isn't as safe as you think.

Phishing Attacks Evolve and Pose a More Serious Threat
Go passwordless and adopt multi-factor authentication with single sign-on for multilayered security and guaranteed convenience.

Are You Using the Most Effective Cloud Security Controls?
No doubt enterprises have embraced the cloud, but how about optimizing their cloud security controls? It seems that many enterprises are still not using the crucial tools offered by their cloud provider to ensure tracking, better control user access, and enhance security at every turn. To get the most out of your cloud services, you […]

Employees with the Greatest Risk for Phishing Attacks
Phishing attacks are making a serious comeback, thanks in huge part to the COVID-19 pandemic. According to the 2020 Phishing Attack Landscape Report, commissioned by GreatHorn and conducted by Cybersecurity Insiders, companies are experiencing an average of 1,185 attacks every month, resulting in 15% of organizations having to spend around one to four days reversing […]

6 Mistakes to Avoid When Deploying Multi-Factor Authentication
The combination of username and password is no longer enough to secure your data. This is why multi-factor authentication (MFA) is being adopted by a growing number of organizations and businesses. The goal of MFA is to throw three or more hurdles at cybercriminals to deter them from pursuing access to your network to get […]

4 Technologies to Improve Your Security
For security teams, the COVID-19 pandemic either introduced new challenges or magnified old ones. Because of this, many organizations are assessing new security technologies or speeding up the deployments of others, which have already been in the works. For businesses, the pandemic has made it necessary for security teams to protect widely scattered endpoints and […]