Top

Category: Access control


Access control, Network security, Security

California adds biometric specs to data breach law

October 17, 2019

Via: Hot for Security

California is changing its Information Practices Act of 1977 to expand the definition of personal information with additional identifiers, including biometric data of those affected. The amendment comes with new instructions on how to notify affected parties by a breach. […]


Access control, Network security, Security

Amazon Calls for Government Regulation of Facial Recognition Tech

October 14, 2019

Via: Security Week

The US tech giant, which has come under scrutiny by antitrust enforcers and has been criticized over its use of facial recognition software, set out its positions in a statement posted late Thursday on its corporate website. Some of those […]


Access control, Security

Does poor password hygiene still hamper your ability to achieve high security standards?

October 10, 2019

Via: Help Net Security

While more businesses are investing in security measures like multifactor authentication (MFA), employees still have poor password habits that weaken companies’ overall security posture, according to LastPass. Given that stolen and reused credentials are linked to 80 percent of hacking-related […]


Access control, Security

Google adds Password Checkup feature to Google Accounts, Chrome

October 2, 2019

Via: Help Net Security

The popularity of Google’s Password Checkup Chrome extension has spurred the company to build the technology into Google Account’s Password Manager and the Chrome browser. Unlike the Chrome extension, these new implementations won’t just point out unsafe username/password combinations due […]


Access control, Security

Passwordless authentication is here ​now​, and it is vastly superior to using a password

September 24, 2019

Via: Help Net Security

Mirko Zorz, Help Net Security’s Editor in Chief, recently published ​an article about the state of passwordless authentication​ that predicted a long journey before this technology is viable. We would like to share that passwordless multi-factor authentication is a reality […]


Access control, Application security, Security

3 ways to improve PC security

September 20, 2019

Via: CSO Online

Companies continue to struggle with ensuring their PCs are protected from malware attacks, data breaches and miscellaneous “bad actor” attacks (e.g. ransomware, identity theft, data exfiltration). A new revelation of a security breach every day seems to come every day. […]


Access control, Network security, Security

1 in 4 employees would steal company information to secure their next job

August 28, 2019

Via: Help Net Security

According to a survey of 476 IT security professionals at Black Hat USA 2019, nearly one in four (24%) said they would take company information to help apply for a position at a competitor. The Gurucul study also found that […]


Access control, Security

Hostinger Resets User Passwords Following System Breach

August 27, 2019

Via: Security Week

Web hosting provider Hostinger reset all customer passwords over the weekend, after learning that an attacker gained unauthorized access to one of its internal systems. With over 29 million users in 178 countries, Hostinger, which was established in 2004, is […]


Access control, Security

How to evaluate a password management solution for business

August 26, 2019

Via: Help Net Security

Password managers are one of the most powerful defenses against breaches, which can cause massive damage and be incredibly expensive to mitigate. According to the Ponemon Institutes’ 2019 Password and Authentication Security Behaviors Report, 51% of respondents experienced a phishing […]


Access control, Cyber-crime, Identity theft, Security

Protecting your organization against privileged identity theft

August 14, 2019

Via: Help Net Security

What do the top data breaches of the 21st century have in common? Privileged identity abuse. In these breach instances, well-resourced, external actors were able to gain the credentials of users with access to privileged accounts – such as administrative, […]