MFA


When Cybersecurity Gets Personal 

I was a Victim of the Change Healthcare Breach -By Herbert Spencer – TraitWare Sometimes it’s frustrating being an innovator in cybersecurity. A few days ago, I received a letter from Change Healthcare, notifying me that my personal information had likely been compromised in a recent data breach – the one that affected millions of […]


Secure by Design

TraitWare Signs the Secure by Design Pledge, Joining in CISA’s Quest for Strong Security for All. In April 2023, CISA launched the Secure by Design initiative with the participation of other national and international organizations. This attempts to shift the responsibility of security from the consumer to the technology manufacturer. As part of their ongoing […]


Cyberattack: Where the Blame Goes. And Where Kudos Belong

There have been so many articles and posts about the recent Securities Exchange Commission (SEC) lawsuit against SolarWinds and their #ciso – and plenty written about recent breaches via the Okta platform. So much has been said about how attackers used social engineering to lure users to give up information or reset accounts. …  Still, I feel like […]


What has happened in cybersecurity since Biden called in 2021?

Two years ago (August 25th, 2021) business leaders – including some of Silicon Valley’s biggest Tech players, water and energy companies, banking and insurance firms, and academic institutions – were summoned to the White House to discuss one of the world’s most pressing concerns: Cybersecurity. The meeting came in the wake of several cyber-attacks – […]


Zero Trust is No Silver Bullet

Zero trust is the Buzzword for cybersecurity today. As a result, the market is brimming with “zero trust” solutions. What is it exactly? What solutions should you choose? Making sense of it all, for any company, can be a daunting task. But what’s more, as experts and leaders continue to urge businesses to move to […]


October is Cybersecurity Awareness Month – 2022

Back to Basics Understand The Consequences, Reduce Risk, and Simplify Access with The Basics for Cybersecurity   As proud Champions of Cybersecurity Awareness Month, we’re doing our part to help spread awareness about the need for proper cybersecurity hygiene, while offering enterprise-class solutions for enhanced security and simplified user experience for greater adoption. The consequences […]


MFA Fatigue – What We Learned From the Uber Breach

What Happened, and How Can We Prevent Attacks Like these? Not All MFA Is Created Equal The recent cyber-attack on Uber has had the tech community buzzing. The incident, an example of an attack method called MFA Fatigue, brings up an essential point about MFA that all individuals and organizations need to know: Not All MFA […]


Phight the Phish with Phishing-Resistant MFA

This is something worth thinking about as cybercrime continues to grow and evolve, and as companies are looking to protect themselves and company valuables from costly attack.  Cybercriminals are getting craftier with their methods. Take recent news of a Phishing attack targeting Microsoft 365 email accounts. This large-scale campaign used a relatively new method called AiTM or Adversary […]


Why Choose TraitWare for Trust and Security.

A People Story TRUST. It’s a people thing. Not a technology thing. People build reliable technology. Not the other way around. Choosing which cybersecurity tools you trust to implement and use starts with people. If you’re looking for a solution, you need to know what exactly they are selling, who’s behind it, what problems the […]


TraitWare’s Passwordless MFA Secures Place in the Financial Sector

TraitWare MFA selected to Secure Federal Credit Union


Why Experts Urge All Businesses to Strengthen Cybersecurity Now

Multi-Factor Authentication is Top Priority In light of current world events, experts are urging businesses of all sizes to bolster security, with Multi-Factor Authentication (MFA) as top priority for the protection of our digital assets. While conflict may seem far away for most of us, the reality is that cyberspace knows no borders – and […]


Let’s Discuss Account Takeover, or “ATO”. 

What can we do to better protect ourselves and our companies from account takeover?  Most of us today still believe we are “too small a fish” to have one of our digital accounts taken over. We think to ourselves that no one wants to read my email or post from my Twitter account or comment […]