MFA


6 Mistakes to Avoid When Deploying Multi-Factor Authentication

The combination of username and password is no longer enough to secure your data. This is why multi-factor authentication (MFA) is being adopted by a growing number of organizations and businesses.  The goal of MFA is to throw three or more hurdles at cybercriminals to deter them from pursuing access to your network to get […]


4 Technologies to Improve Your Security for the Pandemic and Beyond

For security teams, the COVID-19 pandemic either introduced new challenges or magnified old ones. Because of this, many organizations are assessing new security technologies or speeding up the deployments of others, which have already been in the works. For businesses, the pandemic has made it necessary for security teams to protect widely scattered endpoints and […]


7 Mistakes and Oversights to Avoid in SSO Implementation and Management

By allowing users to execute a master sign-on to authenticate themselves, single sign-on (SSO) improves user experience in terms of convenience as well as security. However, while SSO takes away the hassle with logins, successful implementation requires diligent management and the proper tools. Because the truth is implementing SSO requires some work and an unerring […]


Why Multi-Factor Authentication Is Essential for Healthcare

Security and data breaches are a major concern for every organization. Companies in the healthcare sector are especially vulnerable: they are a top target for cybercriminals because the black market value of medical data is exceptionally high. According to Experian, medical data sells for more on the dark web than credit card information or other […]


How Can You Optimize Passwordless Authentication?

Have you gone passwordless yet? Making the switch may be the best security move you can make today, because passwords are becoming even less secure, especially when you consider users’ tendency to have poor password security habits. For example, 52 percent of users reuse the same password for multiple accounts, and 59 percent of American […]


ZeroTrust and work from Mars, By Chris Werpy, COO, PlanetOne

As our Planet made the shift to work from wherever, remote access exploded in numbers and speed, with capacity taking the lead.  Looking ahead, it’s time to determine how to not only keep the lights on, but to drive increased productivity without compromising security. Is the environment we work in today designed for the future, […]


How Can You Make MFA Adoption Easier for Everyone in Your Organization?

Multifactor authentication (MFA) is a must for enterprises to ensure data security in the face of both new attacks and persistent older ones that are constantly being fine-tuned by cybercriminals. It offers multiple layers of security to your login processes through multiple means of authentication.  Knowledge (something you know): PIN, username and password, security question   […]


Why Companies Are Reluctant to Go Passwordless

Addressing the Top 4 Reasons for Hesitation Studies have shown an increased appetite among consumers for multi-factor authentication, including biometrics as a replacement for the username and password login method, and evidence is clear that credential-based login poses the number one threat for security breaches. Experts and tech writers have been saying that we need to “break […]


Cyber Resiliency for Small Businesses: Techniques and Tips

Cyber Resiliency for Small Businesses: Techniques and Tips In the context of cybersecurity, resiliency is all about how organizations bounce back from an incident that involves the interconnection of multiple domains such as cybersecurity, business continuity, and organizational operations.  You need to be cyber resilient to adapt and continue to deliver services or provide products […]


How Tech has Evolved. And How it Really Hasn’t.

It’s Time to Fix What’s Been Broken From the Get-Go As humans, we’ve evolved a fair amount. But Technology is another animal altogether. Taking a look at our infographic, the technological shifts we’ve witnessed since the 1950s are nothing short of mind-blowing. From pen and paper and a phone to today’s superpowered mobile devices, AI, […]


Beware of Tycoon—the Ransomware Targeting Windows and Linux Systems

Beware of Tycoon—the Ransomware Targeting Windows and Linux Systems. Windows and Linux systems are in the cyber-crosshairs of a recently uncovered ransomware, in what appears to be a targeted campaign.  Tycoon is a multi-platform Java ransomware that is deployed in the form of a Trojanized Java Runtime Environment (JRE) and leverages an obscure Java image […]


Beware of Phishing Attacks That Can Bypass 2-Factor Authentication

Phishing attacks that can bypass 2-factor authentication. Where 2FA normally offers an extra layer of protection that is lacking in single-layer protection provided by usernames and passwords. In most cases, that should give businesses some much-needed peace of mind. But hackers are forever finding ways to circumvent any security measures developed to thwart their malicious […]