Category: Online authentication

Fax for the memories

Last week, I was perplexed to have someone ask me: ‘What’s your fax number?’. The relative novelty of receiving a fax led us to wonder why, in this digital age, they are not now totally obsolete? The answer: signatures.

Save a Whale… Save your Job!

When I refer to a whale, I am referring to your boss or, in some cases, you! A whale in information security lingo is a person with significant assets or access and whaling (as outlined by Bob Violino on CIO) is but one of many types of cyber attacks that are evolving. From phishing and pharming to spear phishing, the list goes on.

Building a More Secure Internet

It is critical that consumers are certain that the site they visit is the one they intended to access. A new policy signed by the Obama Administration will change the way we do business on the internet.

Education: The key to security compliance

SC Magazine recently took a look at Barclays’ latest effort to inspire security consciousness amongst its staff. As employee awareness initiatives go, this is an innovative and ambitious project. In essence though, Barclays’ new strategy has at its core what many other analysts and experts have told us in the past: that encouraging proactive behaviour among staff is the key to effective security in the enterprise.