Webinar Slides: PHISH-PROOF YOUR USERS - Negate Stolen Credentials and Go Beyond 2FA

 

Webinar Slides: PHISH-PROOF YOUR USERS - Negate Stolen Credentials and Go Beyond 2FA

We, humans, have become the preferred cyber-attack vector. We click on links, we fall for scams, we unknowingly provide our credentials to attackers. With passwords or less protecting 40% of our assets and 81% of breaches involving weak or stolen passwords, attackers are simply walking in the front door. Many are in a rush to deploy 2FA, but a growing number of methods are being bypassed by attackers.  

PHISH-PROOF YOUR USERS - Negate Stolen Credentials and Go Beyond 2FA

 

Webinar On-Demand: PHISH-PROOF YOUR USERS - Negate Stolen Credentials and Go Beyond 2FA

We, humans, have become the preferred cyber-attack vector. We click on links, we fall for scams, we unknowingly provide our credentials to attackers. With passwords or less protecting 40% of our assets and 81% of breaches involving weak or stolen passwords, attackers are simply walking in the front door. Many are in a rush to deploy 2FA, but a growing number of methods are being bypassed by attackers.  

Wall Street Journal: What Keeps CIOs Up at Night?

Wall Street Journal: What Keeps CIOs Up at Night?

Pretty much everything—including how to measure the actual security risks, who has access to the system and whether business partners can be trusted

It is a wonder that chief information officers and chief information security officers sleep at all.

Security in Plain English: How does Anti-Malware Work?

Author: 
Mike Talon | @miketalonNYC

 

This week's user-submitted question: "My company has made anti-virus software mandatory on all machines, including my home machine since I access email on it. How does this software work, and will it impact my machine? Why is it necessary when there are built-in tools?"

Security So Easy, A Sales Guy Can Do It

Author: 
SecureAuth + Core Security

 

Twitter Glitch Exposes Glaring Security Issue: 'We Need to Ditch the Password Completely'

 

Twitter Glitch Exposes Glaring Security Issue: 'We Need to Ditch the Password Completely'

Revelations that Twitter stored the passwords of all 330 million of its users without encryption highlights how the outdated verification method needs to be replaced, according to security experts.

3 Steps for Balancing Security and Productivity

Author: 
SecureAuth + Core Security

 

Most organizations are having a tough time striking a balance between maintaining the strong security they require and giving employees the freedom and flexibility they need to excel at their jobs. For example, allowing users to log in from their mobile devices ensures they can work from anywhere — but opens more doors to the corporate network that attackers could exploit. Conversely, requiring complex passwords and two-factor authentication for every log-on strengthens security — but frustrates users and disrupts critical business workflows.

How Does BYOD and Identity Sprawl Together, Impact Your Business?

Author: 
Mike Talon | @miketalonNYC

 

Last week, we discussed the potential problems businesses run into when it comes to identity sprawl. Now, this idea is not limited to just identities, but also the many devices each individual user has and could potentially bring on your network.

Pages