How your company can protect users, clients, and your own networks this Safer Internet Day This year, Safer Internet Day (this Tuesday, February 8th) is a chance to check in with your current practices and tighten up your defenses for 2022. The theme for Safer Internet Day 2022 is “Together for a better internet”. This is a great perspective to …
One Size Does Not Fit All
How Small and Mid-Sized Businesses are Faring in the Cybersecurity Landscape When threat actors are on the prowl for lucrative plans, they search for many types of data. Some focus on bank details or credit card numbers, while others zero in on medical information or other personal details. But according to the Verizon Data Breach Investigations Report (DBIR), credentials—typically pairs …
Hacking MFA the Technical Way and How to Guard Against These Attacks
Multi-factor authentication (MFA) requires several elements in order to function as real security for your data systems. Each factor in a multi-factor system must be appropriately protected because malicious actors can take advantage of a weak link to dismantle your protection. In part one of our series on the vulnerabilities of multi-factor authentication, we talked about the social engineering tactics …
Cracking Multi-Factor Authentication on the Cheap
Over the last few years, Multi-Factor Authentication (MFA) use has become more common across industries. Having MFA associated with your phone number feels comforting, but it’s also plagued by hackers looking for new methods of attack. If you are holding your phone, is it safe to get a text with a confirmation code sent to your device? Hackers have ways …
The Lifecycle of a Password
Securing Passwords from Create to Retire Organizations are in a non-stop battle to protect their network and meet data security responsibilities in the face of ever-increasing cyberattacks. A key challenge is ensuring that users create secure passwords. Four out of five hacking breaches involve unsafe password practices. In this current threat environment, passwords must exclude passwords exposed in previous data …