Why Two-Factor Authentication Is So Import

Read Nicole Kobie explain why you should enable 2-factor authentication wherever possible on Teen Vogue : Two locks are better than one! While a strong password and a bit of common sense will go a long to keeping your accounts safe, enabling two-factor authenticators is an easy and free second step that’s worth taking. After all, having […]

4 Biometric Security Methods and How They Can Be Beaten

Passwords present many security concerns. Users still choose short and obvious passwords or use the same ones across all their accounts creating a threat vector. But don’t fret yet! Passwords aren’t the only possible factor for authentication. You can use many other factors to identify yourself, including digital certificates, hardware tokens, and biometrics. Right now, […]

Cultivating sound email authentication systems

Ping Look, the executive advisor for security and awareness at Optiv, says assurance in the authenticity of received email is becoming more difficult. That’s because the sophistication of spoofed e-mail is on the rise. Motivations of senders of malicious e-mail are also becoming more varied. Read the interview with Ping Look, the executive advisor for security […]

How Google’s Physical Keys Will Protect Your Password

Read Brian X. Chen and Nicole Perlroth explain how Google’s new physical keys will help you protect your password on NY Times : Why won’t the password just go away? The silly pet names, movie titles or sports teams that many people punch in to get into their online accounts are a weak spot that […]

Strong Authentication Still Elusive for Businesses

Businesses are continuing to rely on passwords, and those that are implementing additional authentication factors are choosing outdated options like static questions and SMS codes that leave them vulnerable to data breaches. Read more about the  Javelin Strategy & Research’s 2017 State of Authentication Report which reveals that only half of all respondents still use […]

iPhone X gets facial authentication, is the enterprise next?

Read why Ryan Zlockie says that enterprises can use iPhone X’s facial authentication on Help Net Security : This week, Apple debuted the iPhone X which kills the Touch ID fingerprint scanner in favor of a 3D facial scanning technology called FaceID. Soon, iPhone users will depend on face recognition in order to check email, […]

Deloitte breach underlines need for better authentication

Cyber attackers have reportedly compromised Deloitte’s global email server through an administrator’s account, giving them unrestricted access to emails and attachments. Read why the hack attack on Deloitte’s global email servers hold lessons for businesses to have proper authentication management system in place on Computer Weekly.

The age of hacking brings a return to the physical key

Read Jungwoo Ryoo’s article about how physical key now makes a return due to growing hacking attacks on GCN : With all the news about Yahoo accounts being hacked and other breaches of digital security, it’s easy to wonder if there’s any real way to keep unauthorized users out of our email and social media […]

FIDO Standards Could Complement Government’s Existing Digital Security Protocols

The FIDO Alliance is hoping that the Trump administration will heed its advice in a new white paper outlining how FIDO standards could complement existing digital security protocols in use by the government. It’s a response to last December’s report from the US Commission on Enhancing National Cybersecurity, which advocated for stronger authentication methods beyond the […]

Impediments to Adoption of Two-factor Authentication by Home End-Users

Cyber criminals have proven to be both capable and motivated to profit from compromised personal information. The FBI has reported that victims have suffered over $3 billion in losses through compromise of email accounts alone (IC3 2016). One security measure which has been demonstrated to be effective against many of these attacks is two-factor authentication […]