Category: Access control

Access control, Network security, Security

Employers should develop cybersecurity protocols and invest more in employee training programs

April 25, 2019

Via: Help Net Security

Organizations want to trust their employees when it comes to cybersecurity, but to do so, they need to better leverage technology. The ObserveIT global survey of 600 IT leaders across various industries found that employers should develop clear cybersecurity protocols […]

Access control, Application security, Cyber-crime, Identity theft, Network security, Security

A casual approach to workplace communications presents major security risks

April 24, 2019

Via: Help Net Security

Workers are comfortable sharing personal, sensitive and confidential information over chat platforms. They practice risky digital habits, and don’t care if their communications are leaked. Symphony Communication Services Workplace Confidential Survey, which polled over 1,500 workers in the U.S. and […]

Access control, Identity theft, Security

Banks continue to prioritize risk management over customer convenience

April 17, 2019

Via: Help Net Security

Almost three in four banks in Asia Pacific anticipate that fraud in their country will increase in 2019, according to a recent poll by FICO. Of specific concern are transactions completed when neither the card nor the cardholder is physically […]

Access control

85% of organizations fail to meet even basic PAM security hygiene

April 5, 2019

Via: Help Net Security

While nearly four out of five organizations (78 percent) now include privileged credential protection as part of their cybersecurity policies, their privileged access management (PAM) security practices are woefully lacking and even worse than you might expect. Eighty-five percent are […]

Access control, Cloud security

Most IT and security professionals feel vulnerable to insider threats

March 21, 2019

Via: Help Net Security

91 percent of IT and security professionals feel vulnerable to insider threats, and 75 percent believe the biggest risks lie in cloud applications like popular file storage and email solutions such as Google Drive, Gmail, Dropbox and more. “The rise […]

Access control, Network security

Citrix Breach Underscores Password Perils

March 13, 2019

Via: Dark Reading

The recent cyberattack on enterprise technology provider Citrix Systems using a technique known as password spraying highlights a major problem that passwords pose for companies: Users who select weak passwords or reuse their login credentials on different sites expose their […]

Access control, Cloud security

CyberArk simplifies privileged access security in cloud environments

March 4, 2019

Via: Help Net Security

CyberArk, the global leader in privileged access security, announced ground-breaking new capabilities to simplify the continuous discovery and protection of privileged accounts in cloud environments. The CyberArk Privileged Access Security Solution v10.8 is the first-of-its-kind to automate detection, alerting and […]

Access control, Network security

Researchers extract master password in cleartext from 1Password

February 22, 2019

Via: Hot for Security

Regular internet users today juggle numerous accounts on various platforms and websites, often using the same weak password for all of them. Tech-literate users employ different passwords for different accounts, and strong ones at that. Those who are truly conscientious […]

Access control, Network security

Are Passwords Killing Your Customer Experience? Try Passwordless Authentication

February 21, 2019

Via: Security Intelligence

Creating a seamless, secure experience for your legitimate users is a challenge. Most users are good and deserve a frictionless experience, but the less than 0.1 percent of users that are suspected to be rogue actors, according to IBM Trusteer, […]

Access control, Security

What is biometrics? And why collecting biometric data is risky

February 12, 2019

Via: CSO Online

Biometric authentication uses physical or behavioral human characteristics to digitally identify a person to grant access to systems, devices or data. Examples of these biometric identifiers are fingerprints, facial patterns, voice or typing cadence. Each of these identifiers is considered […]