Posts Tagged ‘multi-factor authentication’

Five best practices to protect enterprises from cyber attack

0

Posted on 7th Jul 2015 by in Enterprise Security

In a context of ever growing cyber attacks, as revealed by Gemalto’s Breach Level Index study, enterprises need to defend themselves against cyber threats with an integrated approach that combines sound IT policies with multi layered security.

Layers are the key to good cake and secure banking

0

Posted on 23rd Apr 2015 by in Financial Services

Much like good cakes, the best security solutions have layers. Efficient security policies don’t rely on a single technique. Instead, they integrate several complementary layers. In this post, we explain why this layered approach is needed for modern, digital banking.

It’s time to move away from traditional passwords and prioritize online security

0

Posted on 5th Feb 2015 by in Enterprise Security

Whilst it’s good ‘password’ is no longer the number 1 password (now it’s number 2), there hasn’t been enough progress with regard to consumer and business habits – multi-factor authentication is the only way to address this safely; in this post, we explain why.

More than EMV: President Obama’s executive order paves the way for more secure online services

0

Posted on 22nd Oct 2014 by in Corporate

Last week President Obama signed an executive order that is getting a lot of attention for mandating “Chip & PIN” EMV technology for all federally-issued payment cards and terminals.  My colleague, Philippe Benitez, wrote a great piece about it here. It’s understandable that EMV is in the spotlight these days as the entire nation is […]

Key lessons for the Galactic Empire on cyber security and authentication

0

Posted on 13th Oct 2014 by in Enterprise Security

As Episode VII draws closer, we offer some observations for the leadership of the Galactic Empire to note with regard to managing authenticated access and dealing with cyber threats.

One Device to Control Them All

0

Posted on 12th Sep 2014 by in Mobile

CTIA Super Mobility Week showed us that it’s never been more clear that there’s a massive influx of connected devices that are crossing over both work and personal activities. The biggest challenge is no longer in getting connected, but in securely managing all those connections and remembering the myriad of passwords and user names – on […]

Less than two weeks before the return of CryptoLocker and ZeuS malware – Panic time?

0

Posted on 5th Jun 2014 by in Enterprise Security

The UK’s National Crime Agency (NCA) is warning everyone to protect themselves against Cryptolocker and ZeuS malware before they both make inevitable returns to the web in less than two weeks. The NCA is working with the FBI and Europol in an effort to suppress the GameOverZeuS Trojan and the Cryptolocker ‘ransomware’ that encrypts victims’ […]

Here we go again

0

Posted on 22nd May 2014 by in Enterprise Security

It’s happened again, this time to “The World’s Online Marketplace” – eBay. The online auction giant announced yesterday that a database, holding the personal details of up to 223 million users, was hacked. Ebay has asked 128 million users to change their account passwords in the wake of the breach.  The cybercriminals were able to […]

Passwords… When will we learn?

0

Posted on 10th Mar 2014 by in Enterprise Security

The news that “123456” has replaced “Password” as the worst password of 2013, (covered here by Ina Fried) could be taken as a positive. After all, “123456” is at least marginally less obvious than “password”. However, it should also act as a wake-up call for those who still believe a mere password is the most […]

Should your “friend” social login for your business? Visit us at RSA Conference to find out.

0

Posted on 20th Feb 2014 by in Enterprise Security

Here’s a familiar scenario: I hear about a great website/service that interests me.  It’s free, but I have to create an account to use the service. I’m not sure I’m going to keep using the service, so I hesitate to set up an account. Then I notice that I can login using my LinkedIn profile, […]