Multi-Factor Authentication
Turn on MFA Before Crooks Do It For You
Hundreds of popular websites now offer some form of multi-factor authentication (MFA), which can help users safeguard access to accounts when their password is breached or stolen. But people who don't take ...
Building on the IAM Benefits of SSO with MFA and Privileged Access Management
In part one of this post, we talked about why identity access management (IAM) is important. In that discussion, we identified three types of IAM: Single Sign On Multi-Factor Authentication Privileged Access ...
Hackers don’t break in – they log in
We talked about this very often so far: Passwords are by far the weakest link when it comes to security today. 81% of successful attacks involve lost, breached or re-used passwords. There ...
Security in Today’s Global Remote Workforce Era
Here are four ways security teams can support a sudden and large remote workforce Security measures put in place across global organizations historically have not been one of the top three priority ...
Renaissance of the OTP hardware token
Multi-factor Authentication is just that ? multi-factor. There are a number of ways to implement MFA including the use of OTP hardware tokens ...
What Is Multi-Factor Authentication, and What Does It Have to Do with You?
Security isn’t a simple matter of caring or spending time reading manuals or being told what you can or can’t do. Security is understanding how to view the world from a different ...
iPhones now work as physical security keys for Google services
As multi-factor authentication becomes ubiquitous across all digital services, Google is adding a new safety net for security-conscientious iPhone owners. Apple customers can now use their shiny smartphones as security keys to ...
Stronger Multi-Factor Authentication With Certificates
It’s widely held knowledge that using a single factor for authentication to wireless networks is less than secure and easily exploited by hackers. Many organizations recognize this and utilize Multi-Factor Authentication (MFA) ...
Top 10 Cybersecurity and Privacy Resolutions
In episode 101: Start the new year off right by following our top 10 cybersecurity and privacy resolutions! ** Show notes and links mentioned on the show ** Recommended Password Managers KeePass ...
Are Passwords Now Passé?
Originated at the Massachusetts Institute of Technology in 1961, passwords have long been a central component of digital security. But in the nearly 60 years since they were first implemented as a ...

