cybersecurity


Privileged Identity Account Takeover – Risks and Solutions

OFFER ISRAELI GVP & GM, Identity Threat Defense, Proofpoint recently  wrote: “Attackers are increasingly focused on privileged identity account takeover (ATO) attacks because they can compromise organizations much more easily and quickly this way, as compared to the time, effort, and cost to exploit a software vulnerability (a common vulnerability and exposure or CVE). And […]


Cyberattack: Where the Blame Goes. And Where Kudos Belong

There have been so many articles and posts about the recent Securities Exchange Commission (SEC) lawsuit against SolarWinds and their #ciso – and plenty written about recent breaches via the Okta platform. So much has been said about how attackers used social engineering to lure users to give up information or reset accounts. …  Still, I feel like […]


What has happened in cybersecurity since Biden called in 2021?

Two years ago (August 25th, 2021) business leaders – including some of Silicon Valley’s biggest Tech players, water and energy companies, banking and insurance firms, and academic institutions – were summoned to the White House to discuss one of the world’s most pressing concerns: Cybersecurity. The meeting came in the wake of several cyber-attacks – […]


7 Reasons you should NOT use Free Authenticator Apps for Security

And why you should use Strong MFA instead Despite the call from world leaders for strong Multi-Factor Authentication (MFA) to protect individuals and organizations against cyber-attack, the vast majority just isn’t up to snuff when it comes to security. Most of us know that security starts with Identity and Authentication – ensuring that users Are […]


What is the FTC Safeguards Rule? And Will it Affect You?

What is the FTC Safeguards Rule? In 1999, The Federal Trade Commission (FTC) initiated The FTC Gramm-Leach-Biley Act’s (GLBA) Safeguards Rule in an effort to safeguard consumers and protect personal information from getting into the wrong hands. FTC Summary: “The Safeguards Rule requires financial institutions under FTC jurisdiction to have measures in place to keep customer […]


Norton LifeLock and LastPass Breaches Raise Doubt about the Security of Password Managers  

But are the Wrong Questions Being Asked? Recent news of cyber-attacks on two major security companies has many asking, “Are password managers secure enough to protect our data?” But perhaps there’s a more important question that needs to be addressed. This week, news came of a cyber-attack on Norton LifeLock. Several thousand customers were reportedly […]


Why MSPs are at Risk of Attack

And How MSPs Can Reduce Risk In a joint advisory issued this May, several International government agencies — the Cybersecurity and Infrastructure Security Agency (CISA), the UK’s National Cyber Security Centre (NCSC-UK), the Australian Cyber Security Centre (ACSC), Canadian Centre for Cyber Security (CCCS), New Zealand National Cyber Security Centre (NZ NCSC), US National Security […]


Phight the Phish with Phishing-Resistant MFA

This is something worth thinking about as cybercrime continues to grow and evolve, and as companies are looking to protect themselves and company valuables from costly attack.  Cybercriminals are getting craftier with their methods. Take recent news of a Phishing attack targeting Microsoft 365 email accounts. This large-scale campaign used a relatively new method called AiTM or Adversary […]


Trust & Security

A People Story TRUST. It’s a people thing. Not a technology thing. People build reliable technology. Not the other way around. Choosing which cybersecurity tools you trust to implement and use starts with people. If you’re looking for a solution, you need to know what exactly they are selling, who’s behind it, what problems the […]


TraitWare Earns SOC 2 – Type II Certification

TraitWare TraitWare Inc., market leader for enterprise-class native Passwordless Multi-Factor Authentication (MFA) and Single Sign-On (SSO) combined for simple secure login, today announced that it has successfully completed the SOC 2 Type 2 audit. Conducted by Eide Bailly LLP, a leading North Dakota-based certified public accounting and business advisory firm, the audit affirms that TraitWares information […]


Why Experts Urge All Businesses to Strengthen Cybersecurity Now

Multi-Factor Authentication is Top Priority In light of current world events, experts are urging businesses of all sizes to bolster security, with Multi-Factor Authentication (MFA) as top priority for the protection of our digital assets. While conflict may seem far away for most of us, the reality is that cyberspace knows no borders – and […]


You can’t have Security without Privacy

Privacy vs. Security. Can you have both? While there’s a difference, we think the two belong together – especially when it comes to Identity. While data security has become increasingly important for companies of all sizes – with the risk and severity of cyberattack steadily rising – regulations like GDPR, CCPA mean companies are also having […]