PASSWORDS


Privacy & Cybersecurity Compliance Deadlines – 2024

What Privacy and Security Mean for Companies With Data Privacy Week coming up soon, we’re thinking about the important symbiotic relationship between privacy and security, and ahead to some pending deadlines for cybersecurity and privacy compliance. How can company leaders best navigate the waters and enjoy peace of mind? Here are a few upcoming privacy and security […]


The LastPass Lockout – And Lessons in MFA

Angry LastPass users have taken to social media with reports that they’ve been struggling to access their accounts since the company’s security upgrade back in May. What’s more, there doesn’t seem to be a simple solution in sight. What does this have to do with MFA? The trouble began on May 9, 2023, when LastPass […]


Norton LifeLock and LastPass Breaches Raise Doubt about the Security of Password Managers  

But are the Wrong Questions Being Asked? Recent news of cyber-attacks on two major security companies has many asking, “Are password managers secure enough to protect our data?” But perhaps there’s a more important question that needs to be addressed. This week, news came of a cyber-attack on Norton LifeLock. Several thousand customers were reportedly […]


HOW TO HACK A PASSWORD

Password Hacking or Cracking has evolved over the years, with instances of serious credential-based attacks topping headlines daily. Why? It’s become frighteningly easy for cybercriminals to get your password. Several high-profile attacks in recent news (SolarWinds, The US Pipeline … and so on) sparked an executive order from the White House calling for improved cybersecurity […]


DON’T LET YOUR BROWSER STORE COMPANY PASSWORDS!

No one likes the Password. Clunky, frustrating, and by now, we all know they’re not particularly secure, as almost daily we hear news of cyberattacks with compromised user credentials as the root cause. But until they go away, there is a proper way to manage them. Here, are a few quick DOs and DON’Ts around […]


Best Practices for SMEs’ Data Security

Data Security at SME’s are targeted by cyber attackers for their lack of resources or expertise to effectively protect their data. Managed security services provider Alert Logic estimates that small businesses make up 58% of malware attack victims, and that 94% of these attacks are carried out through malware or phishing emails disguised as bills, […]


How Does Biometric Authentication Improve User Experience and Enterprise Security?

Biometric authentication is a method of digital identification and authentication through physical or behavioral human characteristics for access to systems, devices, or data. It is one of the methods that drive both two-factor authentication (2FA) and multifactor authentication (MFA).  Biometrics is one of the technologies that are being adopted as more advanced methods to address increasing […]


7 Priciest Data Breach Penalties Ever

The cost of a data breach is becoming more pricey—especially with the introduction of international data protection laws such as the EU’s General Data Protection Regulation (GDPR) in 2018. According to IBM, a breach of 1 million records has an average total cost of 42 million USD, which represents an eight percent growth from 2018.  […]


What Is Password Spraying, and How Can You Avoid It

In August last year, the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA), prompted by the advisory released by the Australian Cyber Security Centre (ACSC), advised the American public to be watchful of their passwords with the threat of a new form of brute force attack known as password spraying, which targets businesses […]


What is the Difference Between Passwordfree and Passwordless

Passwords are getting less and less popular nowadays. Some experts say the era of passwords is over. Aside from the fact that people find it hard to manage and remember their passwords, there is also the problem of security. In the current complex IT environment, passwords are no longer enough to protect our online data.  […]


Common Issues with Passwords as a means of Authentication

Though the creation of the passwords was originally intended to protect online data, in today’s IT environment, passwords are considered one of the weakest links in security. The era of passwords is about to end. In fact, most cyberattacks across the web stem from compromised passwords. It’s about time we acknowledge the major failings of […]


Why are MultiFactor Authentication Solutions Good For Verification Purpose

With the IT environment getting more and more complicated, the traditional authentication method using only passwords is no longer secure. A study revealed that there are 8.2 million passwords stolen every day, meanwhile about 95 passwords stolen per second. Passwords have become our greatest weakness. Although we have relied on passwords for our security and […]