Whilst it’s good ‘password’ is no longer the number 1 password (now it’s number 2), there hasn’t been enough progress with regard to consumer and business habits – multi-factor authentication is the only way to address this safely; in this post, we explain why.
Posts Tagged ‘passwords’
Posted on 5th Feb 2015 by Shannon Taylor in Enterprise Security
Posted on 28th Jan 2015 by Jean-Francois Ouillet in Mobile
The average consumer uses 25 different usernames to log in to all their online services, at a cost of convenience and security. How can we address the challenge, improve the user experience and increase our overall security from the hacker threat? Mobile Authentication is one key answer.
Posted on 12th Jan 2015 by Maria Barbieri in Enterprise Security
With new mobile devices like the iPhone 6 and Apple iPad Air 2 topping many present lists this year, we’ve compiled top tips to help businesses ensure they haven’t unwrapped mobile security threats over the festive period.
Posted on 5th Jan 2015 by Jennifer Dean in
A look back at some of 2014’s biggest enterprise security stories, and what we’ve learned from them
Posted on 29th Dec 2014 by Ken Abbott in Corporate
When it comes to living life online, digital graveyards will play an important role in the history books…
Posted on 14th Nov 2014 by Jennifer Dean in Enterprise Security
Home Depot dealt with its data breach by switching operating system but upon closer inspection it would perhaps have been better to invest in strong authentication technology and staff training.
Posted on 7th Nov 2014 by Jennifer Dean in Enterprise Security
The CFO arguably has the top job when it comes to assessing risk and making decisions on security investments. Most will have the support of the CIO in evaluating all the risks associated with technology, but have they considered all the issues that modern working practice expose the executive management team to?
Posted on 31st Oct 2014 by Jennifer Dean in Enterprise Security
CIOs considering how their organization is exposed to different risks could gain some helpful insights from the heroes and villains in recent comic-book movie adaptions.
Posted on 24th Oct 2014 by Jennifer Dean in Enterprise Security
C-level executives are arguably a business’ most valuable and vulnerable asset. We’ve compiled five tips so you can encourage them to defend themselves when they’re out and about.
Posted on 22nd Oct 2014 by Neville Pattinson in Corporate
Last week President Obama signed an executive order that is getting a lot of attention for mandating “Chip & PIN” EMV technology for all federally-issued payment cards and terminals. My colleague, Philippe Benitez, wrote a great piece about it here. It’s understandable that EMV is in the spotlight these days as the entire nation is […]