MFA-Ebook-2

Five ways to hack MFA, and the FBI’s mitigation strategy [E-book]

Advances in technology have led to the creation of multiple data security methods that help organizations secure sensitive data from the prying hands of attackers. Of these, multi-factor authentication (MFA) is one ...
MFA-Hacks-webinar2

Avert cyberattacks against MFA using FBI-recommended countermeasures [Webinar]

With the rise of remote work, multi-factor authentication (MFA) has become more essential than ever. MFA can be used to protect authentications happening on different resources like workstations, VPNs, and enterprise applications. MFA ...

The Health of Security

After experiencing a massive ransomware attack that caused the near-shutdown of 400 sites, the Universal Health Services (UHS) has become the most recent example to highlight the issue of cybersecurity in health ...
radius mfa vpn

Securing VPN Authentication with RADIUS & MFA

Due to the Covid-19 pandemic, organizations all over the world have closed their offices and sent their employees home to work remotely. The mass exodus from the office to remote working has ...
Securing Devices at Home and Work

Securing Devices at Home and Work

It's National Cybersecurity Awareness Month! We're sharing tips to secure your devices at home and at work so that you can #BeCyberSmart. The post Securing Devices at Home and Work appeared first ...
https://www.avatier.com/blog/wp-content/uploads/2019/07/blog-Self-Assess-Your-MFA-Implementation-in-5-Steps-copy.jpg

Multi-Factor Authentication for Okta VPN

When it comes to authentication security, one of the simplest upgrades you can make that will drastically improve your network’s safety is to implement Multi-Factor Authentication (MFA). Simply put, MFA is any ...

Good, Better, Best: Using Multi-factor Authentication Effectively

| | MFA, Password Tips
Multi-factor authentication (MFA) is useful, but not a failsafe strategy for user authentication. The purpose of identity and access management technology is, generally speaking, to prevent unauthorized users from viewing, stealing, or ...
woman biting pencil while sitting on chair in front of computer during daytime

Are Passwords Secure?

Credential-based authentication is the method nearly all network users are used to and has been a common tool for decades. But unlike other decades-old technology, passwords have not been phased out of ...
iPhone Hacks: What You Need to Know About Mobile Security

iPhone Hacks: What You Need to Know About Mobile Security

Guest Post by Jennifer BellLearn How Hackers Steal and Exploit Information to Ensure This Doesn’t Happen to You Cybersecurity is an important topic to know and understand in order to keep your ...

Back to Basics: Simple Moves to Keep You Secure at Home

Guest Post by Susan DoktorStaying at home, something we’ve all been doing a lot more of, can be relaxing. But as our attention has been focused elsewhere, particularly on our health and ...