Posted on 11 April 2022 by
Two years ago, the Covid-19 pandemic forced millions of workers across the globe into remote working and turned the way we work on its head. Prior to the pandemic, flexible or remote working arrangements had been the exception in most organisations – yet overnight it became the norm. Since then, you couldn’t move for endless […]
Posted on 03 September 2019 by
Is Two Factor Authentication a Waste of Time? Not All MFA Methods are Created Equal Over the past few years, people have been advised to replace the passwords they use to access cloud services, with two-factor authentication or ‘two step verification’. This is because the majority of data breaches to cloud services are the result […]
Posted on 06 October 2017 by
With all of the data breaches occurring, you would think that companies would be faster to implement multi-factor authentication and user access controls, but we see yet another – Deloitte’s. Moving to the cloud creates a lack of access control. How will you avoid a data breach?
Posted on 10 September 2015 by
The breach of the IRS affected 334,000 taxpayers, whose personal information including Social Security numbers and home addresses, were compromised. Learn the key lessons from this attack.
Posted on 15 July 2015 by
Enterprise mobility cannot be separated from enterprise mobile security. And in this respect, two-factor authentication plays a crucial role.
Posted on 01 May 2014 by
Two-factor authentication can prevent unauthorized access and credential leakage by ensuring that only a validated user is given system access.