Deloitte data breach demonstrates why MFA and user access controls… Posted on 06 October 2017 by Danna Bethlehem in Enterprise Security With all of the data breaches occurring, you would think that companies would be faster to implement multi-factor authentication and user access controls, but we… Lessons from the IRS Data Breach Posted on 10 September 2015 by Danna Bethlehem in Enterprise Security The breach of the IRS affected 334,000 taxpayers, whose personal information including Social Security numbers and home addresses, were compromised. Learn the key lessons from… How Two-Factor Authentication Ensures Mobile Workforce Security Posted on 15 July 2015 by Danna Bethlehem in Enterprise Security Enterprise mobility cannot be separated from enterprise mobile security. And in this respect, two-factor authentication plays a crucial role. Two-Factor Authentication Effectively Mitigates Security Incidents and Data Breaches Posted on 01 May 2014 by Danna Bethlehem in Enterprise Security Two-factor authentication can prevent unauthorized access and credential leakage by ensuring that only a validated user is given system access. From Twitter Loading... More from Twitter Subscribe to updates Select a category of interest: All Categories Enterprise SecurityFinancial ServicesGovernmentIoTMobileSoftware Monetization Enter your email address: Delivered by FeedBurner. Submitting this form will open a popup window to the FeedBurner website. Latest comments 11/01/19 @ 04:01 Eva Looks cool to avoid unexpected payment by thieves with a stolen card. More secure09/01/19 @ 10:01 Kareem Excellent series of blog on the topic. Many thanks.09/01/19 @ 10:01 Kareem Thanks for the explanation. It would be helpful if you cover the idea of a primary and secondary device, where LPA sits exactly in this case and what S/W sits on the primary device.