Home Depot dealt with its data breach by switching operating system but upon closer inspection it would perhaps have been better to invest in strong authentication technology and staff training.
Posts Tagged ‘passwords’
Posted on 14th Nov 2014 by Jennifer Dean in Enterprise Security
Posted on 7th Nov 2014 by Jennifer Dean in Enterprise Security
The CFO arguably has the top job when it comes to assessing risk and making decisions on security investments. Most will have the support of the CIO in evaluating all the risks associated with technology, but have they considered all the issues that modern working practice expose the executive management team to?
Posted on 31st Oct 2014 by Jennifer Dean in Enterprise Security
CIOs considering how their organization is exposed to different risks could gain some helpful insights from the heroes and villains in recent comic-book movie adaptions.
Posted on 24th Oct 2014 by Jennifer Dean in Enterprise Security
C-level executives are arguably a business’ most valuable and vulnerable asset. We’ve compiled five tips so you can encourage them to defend themselves when they’re out and about.
Posted on 22nd Oct 2014 by Neville Pattinson in Corporate
Last week President Obama signed an executive order that is getting a lot of attention for mandating “Chip & PIN” EMV technology for all federally-issued payment cards and terminals. My colleague, Philippe Benitez, wrote a great piece about it here. It’s understandable that EMV is in the spotlight these days as the entire nation is […]
Posted on 13th Oct 2014 by Jennifer Dean in Enterprise Security
As Episode VII draws closer, we offer some observations for the leadership of the Galactic Empire to note with regard to managing authenticated access and dealing with cyber threats.
Posted on 30th Jul 2014 by Macey Morrison in Enterprise Security
Being in the security business, we hear our customers’ pains and challenges often when it comes to securing their data, and lately the cloud has been the monkey on their back they can’t shake. Shadow IT has given businesses something to think about in regards to understanding their full footprint in the cloud as well […]
Posted on 22nd Jul 2014 by Macey Morrison in Enterprise Security
Over at CloudEntr, we love to be loved by our customers (spoiler: we love them back), so we were especially excited to receive a little press from one of our customers AVISIAN Publishing, publishers of more than 10 print and digital publications specializing in the identification technology space. AVISIAN shared the same pain as many of […]
Posted on 2nd Jul 2014 by Jean-Francois Ouillet in Mobile
Social log-in services can be excellent time-saving tools and are a very convenient way to avoid the tedious process of online registration, filling in numerous forms and general password fatigue. So why are Facebook and Google’s versions of this tool not used more often? The answer’s simple; privacy is paramount to security, so why would […]
Posted on 10th Mar 2014 by Jennifer Dean in Enterprise Security
The news that “123456” has replaced “Password” as the worst password of 2013, (covered here by Ina Fried) could be taken as a positive. After all, “123456” is at least marginally less obvious than “password”. However, it should also act as a wake-up call for those who still believe a mere password is the most […]