two-factor authentication

Workarounds for Two-Factor Authentication in a Workplace That Isn’t BYOD-Friendly

Two-factor authentication can be difficult in a workplace that doesn’t allow smartphones. But it’s not impossible It’s hard to overstate how dramatically the smartphone has changed our world and our daily lives ...
Security Boulevard
Hostinger Resets Client Passwords Following Security Incident

Hostinger Resets Client Passwords Following Security Incident

Web hosting provider and Internet domain registrar Hostinger reset all Hostinger Client passwords following a security incident. On 23 August, Hostinger learned from an informational alert that an unauthorized party had gained ...

Web Hosting Security Best Practices

If you’ve been online recently, you may have read the news about hackers demanding a ransom from Dublin’s tram system. Visitors to the Luas website were greeted by the hackers’ message threatening ...
3 Key Mobile Enterprise Threats in 2018

3 Key Mobile Enterprise Threats in 2018

As attackers constantly innovate new exploitation and evasion techniques, enterprise security teams are having to stay ahead of a host of emerging threats. Often, these threats have been encountered in other enterprises, ...
Cybersecurity approaches to keep PHI safe

Cybersecurity approaches to keep PHI safe

Healthcare organizations have always kept the possibility of data breaches in mind, especially since 2017 witnessed the biggest and most expensive data breach to date. To counter this, more businesses have hired ...