Fraud Protection February 16, 2017 It’s Time for Users to Pony Up and Quit Reusing Passwords 4 min read - By reusing passwords across multiple services, users make it easier for cybercriminals to breach all their accounts, not to mention company databases.
Identity & Access January 30, 2017 Two-Factor Authentication: A Little Goes a Long Way 3 min read - Online services are understandably reluctant to add steps to the login process, but a little two-factor authentication can significantly boost security.
Identity & Access January 24, 2017 Hacked by a Kid?! A Story to Illustrate the State of Authentication Today 3 min read - A 6-year-old child ordered $250 worth of merchandise by using her sleeping mother's fingerprint to satisfy her phone's authentication requirements.
January 19, 2017 Credential-Stuffing Schemes Rely on Recycled Login Information 2 min read - Credential-stuffing schemes rely on the widespread, irresponsible practice of using the same login credentials to access multiples accounts.
January 10, 2017 Missing Security Plus Malicious Attacks Equals Massive MongoDB Servers Breach 2 min read - Cybercriminals leveraged poor password hygiene among users and administrators to compromise nearly 30,000 databases on MongoDB servers.
December 21, 2016 The Move to Multifactor Authentication: Are Passwords Past Their Prime? 2 min read - According to a recent survey, 93 percent of organizations use multifactor authentication to protect user accounts and corporate networks from cybercrooks.
December 21, 2016 Ameriprise Leak Highlights the Crucial Role of Password Protection 2 min read - The Ameriprise leak exposed sensitive financial data and highlighted the importance of password protection, especially when backing up confidential data.
X-Force December 19, 2016 Hacked for the Holidays: When You’re Asked to Fix the Family Computer 3 min read - If you're an IT professional, you'll likely be tapped to fix the family computer this holiday season. Leave your loved ones with these online safety tips.
November 15, 2016 WindTalker: Breezy Burglars Steal Passwords With Wi-Fi Dupe 2 min read - The WindTalker exploit enables fraudsters to deduce smartphone passwords and PINs over public Wi-Fi by analyzing changes in CSI.
Incident Response October 18, 2016 Data Breaches and the Importance of Account Protection and Incident Response 9 min read - Data breaches can be devastating to an organization. Defense against data breaches starts and ends with account protection and incident response.