Tag "Password Security"

Back to homepage
Identity Theft Software

1.5m Users Hit By New Facebook Privacy Breach As Extent Of Data Misuse Exposed

Facebook’s alleged data misuse hit the headlines (again) on Thursday as Business Insider revealed that the company had “harvested the email contacts of 1.5 million users without their knowledge or consent when

Software

Your Password Manager Won’t Protect You: 3 Ways to Secure Your Data

If there’s anything harder than remembering the hundreds of passwords you have to use every day just to work, shop online, or read the news, it’s keeping those passwords safe

Software

Who are the biggest targets of credential stuffing attacks?

Media organizations, gaming companies, and the entertainment industry are among the biggest targets of credential stuffing attacks, in which malicious actors tap automated tools to use stolen login information to

Software

How password-less security benefits helpdesks

IT departments and helpdesk teams are desperately overworked and understaffed, and unfortunately, they continue to get inundated with even more tasks. Helpdesk teams are there for everything from huge system

Software

Top five human errors that impact data security

A recent paper by Osterman Research reports that less than half of organisations train their employees on GDPR.A recent paper by Osterman Research reports that less than half (42 per

Industry Insights

How to be Secure in the Challenging Business Landscape

Data security is far from a side issue, of interest only to big players. On the contrary, it applies in equal measure to start-ups, small- and medium-sized enterprises, and global

Industry Insights

CIOs admit certificate-related outages routinely impact critical business applications and services

Certificate-related outages harm the reliability and availability of vital network systems and services while also being extremely difficult to diagnose and remediate. Unfortunately, the vast majority of businesses routinely suffer

Cloud

When it comes to file sharing, the cloud has very few downsides

Organizations storing data and documents they work on in the cloud is a regular occurrence these days. The cloud offers scalability in terms of storage and cloud services often provide

Software

Employee cybersecurity essentials part 1: Passwords and phishing

Your company may have state-of-the-art monitoring and the latest anti-malware and anti-virus programs, but that doesn’t mean you’re not at risk for a breach, or that – as an employee,

Hardware/Network

Authentication Bypass Vulnerability: What is it and how to stay protected?

Organizations failing to enforce strong access policy and authentication controls could allow an attacker to bypass authentication. Attackers could also bypass the authentication mechanism by stealing the valid session IDs