Turn on MFA Before Crooks Do It For You

Turn on MFA Before Crooks Do It For You

Hundreds of popular websites now offer some form of multi-factor authentication (MFA), which can help users safeguard access to accounts when their password is breached or stolen. But people who don't take ...

Building on the IAM Benefits of SSO with MFA and Privileged Access Management

In part one of this post, we talked about why identity access management (IAM) is important. In that discussion, we identified three types of IAM: Single Sign On Multi-Factor Authentication Privileged Access ...

Hackers don’t break in – they log in

We talked about this very often so far: Passwords are by far the weakest link when it comes to security today. 81% of successful attacks involve lost, breached or re-used passwords. There ...
corporate security

Security in Today’s Global Remote Workforce Era

Here are four ways security teams can support a sudden and large remote workforce Security measures put in place across global organizations historically have not been one of the top three priority ...
Security Boulevard

Renaissance of the OTP hardware token

Multi-factor Authentication is just that ? multi-factor. There are a number of ways to implement MFA including the use of OTP hardware tokens ...

What Is Multi-Factor Authentication, and What Does It Have to Do with You?

Security isn’t a simple matter of caring or spending time reading manuals or being told what you can or can’t do. Security is understanding how to view the world from a different ...
iPhones now work as physical security keys for Google services

iPhones now work as physical security keys for Google services

As multi-factor authentication becomes ubiquitous across all digital services, Google is adding a new safety net for security-conscientious iPhone owners. Apple customers can now use their shiny smartphones as security keys to ...
https://www.nice.com/engage/blog/wp-content/uploads/2019/11/Types-of-Biometrics-Blog-682X325.jpg

Stronger Multi-Factor Authentication With Certificates

It’s widely held knowledge that using a single factor for authentication to wireless networks is less than secure and easily exploited by hackers. Many organizations recognize this and utilize Multi-Factor Authentication (MFA) ...

Top 10 Cybersecurity and Privacy Resolutions

In episode 101: Start the new year off right by following our top 10 cybersecurity and privacy resolutions! ** Show notes and links mentioned on the show ** Recommended Password Managers KeePass ...

Are Passwords Now Passé?

Originated at the Massachusetts Institute of Technology in 1961, passwords have long been a central component of digital security. But in the nearly 60 years since they were first implemented as a ...
Security Boulevard