cybersecurity


Let’s Discuss Account Takeover, or “ATO”. 

What can we do to better protect ourselves and our companies from account takeover?  Most of us today still believe we are “too small a fish” to have one of our digital accounts taken over. We think to ourselves that no one wants to read my email or post from my Twitter account or comment […]


HOW TO HACK A PASSWORD

Password Hacking or Cracking has evolved over the years, with instances of serious credential-based attacks topping headlines daily. Why? It’s become frighteningly easy for cybercriminals to get your password. Several high-profile attacks in recent news (SolarWinds, The US Pipeline … and so on) sparked an executive order from the White House calling for improved cybersecurity […]


BACK TO SCHOOL FOR CYBERCRIME

Schools are top targets for Cybercrime. It’s time to get educated and educate about the risks, and how to implement a Zero Trust framework for security. With students of all ages still in the early days of their academic year, cybersecurity experts issue stern warnings about cybercrime in schools.  With the increased use of technology […]


What is Real Passwordless MFA?

What is Real Passwordless MFA and Why is it Essential for Enterprise Security? In light of the sharp rise in cyber attacks worldwide – from ransomware to phishing scams to man-in-the-middle attacks – we’ve been told by the likes of Microsoft, countless cybersecurity experts, and even the President of the United States, that it’s time […]


Why Password Reuse Makes the Case for Going Passwordless  

Businesses and individuals alike are far from doomed to live with all the inconvenience and risks posed by passwords and the management challenges that they entail.


Your Password Isn’t Safe, and Neither is Your Traditional MFA.

People say Multi-Factor Authentication (MFA) is the answer. But your typical MFA isn't as safe as you think.


TraitWare® Passwordless Multi-Factor Authentication (MFA) for True Zero Trust Access Beats Competition for Healthcare Security

TraitWare’s patented, plug-and-play Identity & Access solution is chosen by leading Healthcare Services Company (HSC) – beating DUO and displacing RSA – because of greater security, ease of use, and cost savings. Reno, Nevada – April 20, 2021 – TraitWare® today announced that the HSC will adopt TraitWare’s passwordless authentication technology for its employees, healthcare […]


10 Ways Phishing Attacks Have Evolved and Pose a More Serious Threat

Go passwordless and adopt multi-factor authentication with single sign-on for multilayered security and guaranteed convenience.


12 Ways to Secure Your Business Email

Phishing attacks, which target your email, are skyrocketing, as cybercriminals are getting more sophisticated and better at what they do. Because of the massive adjustments that businesses, large or small, have had to make to adapt to COVID-19, vulnerabilities get overlooked, including email security.  Secure your business email by adopting these best practices: 1. Run […]


TraitWare delivers simple, secure access to Citrix Workspace

Citrix continues to empower companies to have better and more secure access to enterprise resources. Now, it has expanded its capabilities and enhanced user experience, efficiency, and security by deploying modern authentication integrations for Citrix Workspace via SAML 2.0. What is SAML 2.0? Security Assertion Markup Language (SAML) is an XML-based open standard for transferring identity […]


Why Companies Are Reluctant to Go Passwordless

Addressing the Top 4 Reasons for Hesitation Studies have shown an increased appetite among consumers for multi-factor authentication, including biometrics as a replacement for the username and password login method, and evidence is clear that credential-based login poses the number one threat for security breaches. Experts and tech writers have been saying that we need to “break […]


Cyber Resiliency for Small Businesses: Techniques and Tips

Cyber Resiliency for Small Businesses: Techniques and Tips In the context of cybersecurity, resiliency is all about how organizations bounce back from an incident that involves the interconnection of multiple domains such as cybersecurity, business continuity, and organizational operations.  You need to be cyber resilient to adapt and continue to deliver services or provide products […]