Tag "MFA"

Back to homepage
Software

Five examples of user-centered bank fraud

In today’s digital-first world, banks and financial service companies need to allow their customers to easily manage money online in order to compete. Unfortunately, most banking platforms were not designed securely and

Cloud Expert Articles

Cloud Security For Businesses

By Katherine Palac – Director of Marketing at Column Information Security, Taking advantage of new technology means being cautious about it. Although the impulse for many businesses is to jump

Software

Zero Trust: The Modern Approach To Cybersecurity

Security strategy begins with an attitude: Never trust, always verify. The conventional notion of the enterprise perimeter—imagining it as one big bubble to be protected—is now thoroughly outdated in a

Hardware/Network

Security spring cleaning: 5 tips for tidying up network safeguards

Networks need regular cleaning just like your home, car or garage. Why? The answer is simple – poor security hygiene can lead to major data breaches. If you don’t regularly review your

Software

What will phishers do once push-based MFA becomes widely used?

As phishing continues to be the number one method for initiating a breach, investing in anti-phishing technologies or training – preferably both – should be a no-brainer for most companies.

Hardware/Network

5 Questions to Help Chart Your Course to Zero Trust Security

It wasn’t that long ago that businesses restricted employees from doing certain activities online. Despite spending most of their time on the road, sales teams but could only access customer

Software

Who are the biggest targets of credential stuffing attacks?

Media organizations, gaming companies, and the entertainment industry are among the biggest targets of credential stuffing attacks, in which malicious actors tap automated tools to use stolen login information to

Hardware/Network

Security Of Enterprise Wireless Networks

Providing enterprise network security is becoming an increasingly complex undertaking, as the number of threats emanating from the Internet continues to grow. Hackers continue to find new ways to attack

Software

Best Practices for Choosing Good Security Questions

Security questions can add an extra layer of certainty to your authentication process. Security questions are an alternative way of identifying your customers when they have forgotten their password, entered

Industry Insights

The most effective security strategies to guard sensitive information

Today’s enterprise IT infrastructures are not largely hosted in the public cloud, nor are they SaaS-based, with security being the single largest barrier when it comes to cloud and SaaS adoption.