October 6, 2021
Via: The Hacker NewsGoogle has announced plans to automatically enroll about 150 million users into its two-factor authentication scheme by the end of the year as part of its ongoing efforts to prevent unauthorized access to accounts and improve security. In addition, the […]
September 30, 2021
Via: CSO OnlineCISOs looking to beef up their customer-facing authentication procedures to thwart cyberattacks need to walk a fine line. You want the method to provide tight security without being too complicated, confusing, or onerous for end users. You also need to […]
Access control, Cyber-crime, Identity theft, Security
September 29, 2021
Via: CSO OnlineTwo-factor authentication (2FA) has been widely adopted by online services over the past several years and turning it on is probably the best thing users can do for their online account security. Faced with this additional hurdle that prevents them […]
September 17, 2021
Via: Help Net SecurityThe ever-evolving shift to digital means that most of our day-to-day activities are carried out online. We’re now accustomed to simply toggling through a few apps to book a ride, order dinner and scroll through content from friends and public […]
September 16, 2021
Via: Help Net SecurityAfter offering the passwordless authentication option to enterprise customers in March 2021, Microsoft has now started rolling it out to its consumer segment of users. The Passwordless account option “Beginning today, you can now completely remove the password from your […]
August 25, 2021
Via: Panda SecurityFacebook and Instagram have been flooded with groups, pages, and profiles that post funny quizzes asking members and followers to answer questions that prompt engagement, such as how old they were for specific dates or events in their lives. Naturally, […]
August 16, 2021
Via: Help Net SecurityNearly two thirds of employees are using personal passwords to protect corporate data, and vice versa, with even more business leaders concerned about this very issue. Surprisingly, 97% of employees know what constitutes a strong password, yet 53% admit to […]
August 11, 2021
Via: Help Net SecurityOrganizations have become more security conscious over the course of the pandemic, leading them to invest heavily in zero trust, according to a study from identity firm Okta. The report surveyed over 600 global security leaders about their initiatives and […]
July 27, 2021
Via: Help Net SecurityWith concerns around online fraud and identity theft rising, consumers expect businesses to utilize new technologies to protect them online. According to research from Trulioo, 84% of people believe that businesses will need to rely more on automated fraud protection […]
July 22, 2021
Via: The Hacker NewsOrganizations today must give attention to their cybersecurity posture, including policies, procedures, and technical solutions for cybersecurity challenges. This often results in a greater burden on the IT service desk staff as end-users encounter issues related to security software, policies, […]
July 20, 2021
Via: Help Net SecurityIncognia announced a report which highlights results from their most recent study focusing on authentication and friction at login and the password reset process. The study was conducted to provide banking, financial services, and investing/trading mobile apps with insights on […]
July 2, 2021
Via: Help Net SecurityThe number of US adults teleworking due to the pandemic fell by 30% between January and May 2021 (from 23% to 16%), with the biggest drop in May. As more employees return to their offices, new and unexpected challenges hidden […]
Access control, Privacy protection, Security
July 1, 2021
Via: Security Week“Security keys offer the strongest protection for your Twitter account because they have built-in protections to ensure that even if a key is used on a phishing site, the information shared can’t be used to access your account,” Twitter explains. […]
June 10, 2021
Via: The Hacker NewsBolstering password policies in your organization is an important part of a robust cybersecurity strategy. Cybercriminals are using compromised accounts as one of their favorite tactics to infiltrate business-critical environments; as we’ve seen in recent news, these attacks can be […]
June 7, 2021
Via: The Hacker NewsThe ransomware cartel that masterminded the Colonial Pipeline attack early last month crippled the pipeline operator’s network using a compromised virtual private network (VPN) account password, the latest investigation into the incident has revealed. The development, which was reported by […]
May 17, 2021
Via: The Hacker NewsIn today’s digital world, password security is more important than ever. While biometrics, one-time passwords (OTP), and other emerging forms of authentication are often touted as replacements to the traditional password, today, this concept is more marketing hype than anything […]
May 4, 2021
Via: Help Net SecurityPeople ignore information that isn’t relevant to them, which is why IT and HR departments have been approaching security training incorrectly for years. Long-form, all-hands security seminar trainings have contributed to nearly daily data breaches for decades. HR and security […]
Access control, Data loss, Security, Threats & Malware
April 26, 2021
Via: The Hacker NewsA staggering number of 3.28 billion passwords linked to 2.18 billion unique email addresses were exposed in what’s one of the largest data dumps of breached usernames and passwords. In addition, the leak includes 1,502,909 passwords associated with email addresses […]
March 26, 2021
Via: Panda SecurityFor all the technological advancements in today’s online world, we remain painfully behind when it comes to password use and security. Most internet users today aren’t aware of the importance of establishing secure and effective passwords, which leaves people vulnerable […]
March 9, 2021
Via: Help Net SecurityThe onset of COVID-19 and resulting distributed workforce have introduced new and complex challenges for businesses, with 45% of IT decision-makers reporting increased pressure from the board around the security of their organization. These findings highlight an increased concern over […]