Posted on 03 September 2019 by
Is Two Factor Authentication a Waste of Time? Not All MFA Methods are Created Equal Over the past few years, people have been advised to replace the passwords they use to access cloud services, with two-factor authentication or ‘two step verification’. This is because the majority of data breaches to cloud services are the result […]
Posted on 06 October 2017 by
With all of the data breaches occurring, you would think that companies would be faster to implement multi-factor authentication and user access controls, but we see yet another – Deloitte’s. Moving to the cloud creates a lack of access control. How will you avoid a data breach?
Posted on 10 September 2015 by
The breach of the IRS affected 334,000 taxpayers, whose personal information including Social Security numbers and home addresses, were compromised. Learn the key lessons from this attack.
Posted on 15 July 2015 by
Enterprise mobility cannot be separated from enterprise mobile security. And in this respect, two-factor authentication plays a crucial role.
Posted on 01 May 2014 by
Two-factor authentication can prevent unauthorized access and credential leakage by ensuring that only a validated user is given system access.