Security


Shadow IT and the Cloud – An Ominous Partnership

Today the ready availability of cloud-hosted software has made it easier than ever for individuals to adopt unofficial software.  This Shadow IT significantly increases the complexity of the attack surface an organization must protect.   Many IT and governance teams and the tools they use are ill-prepared for the size of this challenge.  Shadow IT – […]


The SuperBowl, Coinbase, and the Truth About QR Codes

The QR Code for Cybersecurity


You can’t have Security without Privacy

Privacy vs. Security. Can you have both? While there’s a difference, we think the two belong together – especially when it comes to Identity. While data security has become increasingly important for companies of all sizes – with the risk and severity of cyberattack steadily rising – regulations like GDPR, CCPA mean companies are also having […]


LastPass Says No Passwords Compromised in Security Scare …

But you should ditch that master password anyway. And it’s easier than you may think. Last week Tuesday, another security scare hit cyberspace and password manager LastPass. The scare points, once again, to the fact that passwords are risky. Several users reported receiving email alerts from LastPass, warning that unauthorized attempts had been made to […]


Let’s Discuss Account Takeover, or “ATO”. 

What can we do to better protect ourselves and our companies from account takeover?  Most of us today still believe we are “too small a fish” to have one of our digital accounts taken over. We think to ourselves that no one wants to read my email or post from my Twitter account or comment […]


HOW TO HACK A PASSWORD

Password Hacking or Cracking has evolved over the years, with instances of serious credential-based attacks topping headlines daily. Why? It’s become frighteningly easy for cybercriminals to get your password. Several high-profile attacks in recent news (SolarWinds, The US Pipeline … and so on) sparked an executive order from the White House calling for improved cybersecurity […]


BACK TO SCHOOL FOR CYBERCRIME

Schools are top targets for Cybercrime. It’s time to get educated and educate about the risks, and how to implement a Zero Trust framework for security. With students of all ages still in the early days of their academic year, cybersecurity experts issue stern warnings about cybercrime in schools.  With the increased use of technology […]


What is Real Passwordless MFA?

What is Real Passwordless MFA and Why is it Essential for Enterprise Security? In light of this Cyberwar we’re experiencing – from ransomware to phishing scams to man-in-the-middle attacks – we’ve been told by the likes of Microsoft, countless cybersecurity experts, and even the President of the United States, that it’s time to take cybersecurity […]


A Paradigm Shift in IAM – The Move to Zero Trust Access

A person's identity is the first pillar in a Zero Trust framework. Achieving True Zero Trust Access requires having MFA inherent upon account creation.


Cyber Insurance Isn’t Enough to Protect You

What Companies should consider BEFORE buying There’s a different kind of war going on in cyberspace. Cyberattacks have risen by more than 300% since 2019 and experts predict that cybercrime will only increase in frequency and severity as attackers get smarter, more sophisticated, and more organized. Recent news has focused on larger companies – including […]


Not Safe in the Cyber Streets

Seemingly every day, companies of all sizes unknowingly expose valuable information to cybercriminals around the world. No matter the industry, cyber terrorists will seek to gain control of data in exchange for large sums of money through ransomware attacks. These cybercriminals spare no mercy. Electronic Arts’ critical code exposed One recent victim of a data […]


Are You Letting Your Browser Store Company Passwords?

You may be thinking that storing your login credentials on your computer beats the Post-it. Since experts frown upon password reuse, you’re doing the right thing, right? Here’s why you should stop: Saved passwords invite unauthorized access. Anyone who gains access to your computer will then have access to all your information, simply by accessing […]

X
wpChatIcon