
Cybersecurity: Prevention is Better Than the Cure
Why Proactive Security Matters The principle that “prevention is better than cure” holds true across many fields, but it is especially relevant in cybersecurity and risk management. As organizations face increasingly complex threats, the advantages of a prevention-first approach become clear. In today’s digital landscape, companies of all sizes face relentless cyber threats. While vulnerability […]

2FA is Not MFA: The Distinction Matters More than Ever
In the world of cybersecurity, experts talk a lot about Multi-Factor Authentication (MFA) as the #1 basic requirement for all Enterprises. Companies have a tendency to think of Two-Factor Authentication (2FA) as the same as MFA. But the Truth Is: 2FA is not MFA, and treating them as interchangeable is a dangerous misconception—especially for businesses […]

Strengthening Cybersecurity in Uncertain Times – More Critical Than Ever
strenthening cybersecurity in uncertain times

Google to Replace SMS with QR Codes for Gmail Authentication
A Step Forward Google recently announced it will move from SMS to QR code-based authentication for Gmail accounts. This marks an important shift for cybersecurity, and further validation that companies and individuals are going to have to get beyond Traditional or Weaker security. But is this the best we can do? A Step Toward Stronger […]

Security Doesn’t Matter
It’s About Your Bottom Line Let’s be honest—no one wants to talk about cybersecurity. It’s boring. It’s complicated. And for most business leaders, it’s an afterthought. What really matters? The bottom line. CEOs, CFOs, and decision-makers aren’t losing sleep over how many authentication factors their employees use. They’re worried about revenue, operational costs, and profit […]

How to Phish-Proof Your Login
Across the Enterprise You’ve heard it before: Phishing is the #1 method used by cybercriminals to gain access to your digital valuables. Today, according to CSO Online, 80% of reported security incidents are caused by Phishing. We’ve also heard from CISA and others that MFA is the holy grail for cybersecurity. But then last week, […]

When Cybersecurity Gets Personal
I was a Victim of the Change Healthcare Breach -By Herbert Spencer – TraitWare Sometimes it’s frustrating being an innovator in cybersecurity. A few days ago, I received a letter from Change Healthcare, notifying me that my personal information had likely been compromised in a recent data breach – the one that affected millions of […]

The CDK Global Data Breach
A Worldwide Wake-Up Call Last week, automotive software-as-a-service (SaaS) provider CDK Global reported a Data Breach that has had ongoing catastrophic effects on the company, its customers, and consumers. While the event has devastated the dealerships, the story is a worldwide wake-up call for all. What happened? What are the effects? What can affected companies […]

Secure by Design
TraitWare Signs the Secure by Design Pledge, Joining in CISA’s Quest for Strong Security for All. In April 2023, CISA launched the Secure by Design initiative with the participation of other national and international organizations. This attempts to shift the responsibility of security from the consumer to the technology manufacturer. As part of their ongoing […]

Should Governments Require Stronger Security?
Rising cyber threats and incidents of cyber-attack across the globe have many calling for federal intervention to protect our digital valuables. What’s Happening … In recent news, the United Health Group (UHG) paid a $22 million ransom to the BlackCat ransomware gang for a late February cyber-attack on subsidiary Change Healthcare. The attack, which was […]

Here are Risks and Solutions of Identity Account Takeover
OFFER ISRAELI GVP & GM, Identity Threat Defense, Proofpoint recently wrote: “Attackers are increasingly focused on privileged identity account takeover (ATO) attacks because they can compromise organizations much more easily and quickly this way, as compared to the time, effort, and cost to exploit a software vulnerability (a common vulnerability and exposure or CVE). And […]

Cyberattack: Where the Blame Goes. And Where Kudos Belong
There have been so many articles and posts about the recent Securities Exchange Commission (SEC) lawsuit against SolarWinds and their #ciso – and plenty written about recent breaches via the Okta platform. So much has been said about how attackers used social engineering to lure users to give up information or reset accounts. … Still, I feel like […]