MFA 3

Mixing It Up – Defending Against a Blended MFA Attack

Most businesses employ multi-factor authentication (MFA) security measures to protect their systems and accounts. We’ve talked about the best ways to use MFA effectively and how important it is to protect each layer to keep the bad actors out while still granting your employees and users the access they require. Unfortunately, many businesses believe MFA is all they need to …

dictionary

Blocking Basic Dictionary Words is not Enough

For many organizations, password security comes down to simply implementing blocks on basic dictionary words from being used in the creation of a user’s password. This is not an effective way to secure passwords and may in fact make the creation of a secure password more difficult. There are many ways to improve password security that go beyond blocking dictionary …

mfa

Hacking MFA the Technical Way and How to Guard Against These Attacks

Multi-factor authentication (MFA) requires several elements in order to function as real security for your data systems. Each factor in a multi-factor system must be appropriately protected because malicious actors can take advantage of a weak link to dismantle your protection. In part one of our series on the vulnerabilities of multi-factor authentication, we talked about the social engineering tactics …

cybersecurity tips

Top Five Digital Tips for Thriving in the New Normal

Reports, op-eds, and documentaries point out that many 2020 pandemic-prompted changes are likely here to stay. From contactless takeout food delivery to the widespread adoption of virtual meetings, the disruption of COVID caused many technological and digital shifts for organizations. According to recent information from PWC, which surveyed businesses cross-industry, CEOs plan to make their companies more digital and virtual. …

cybersecurity

Get Involved in Cybersecurity Now

All Hands on Deck The average person is familiar with the idea of security systems at large organizations: key cards, security guards, and ID badges. Similarly, we have a grasp on some small-scale home security: motion-detecting lights, home cameras, and our physical locks and keys. What we haven’t come to terms with is that the digital landscape. It isn’t the …

MFA

Cracking Multi-Factor Authentication on the Cheap

Over the last few years, Multi-Factor Authentication (MFA) use has become more common across industries. Having MFA associated with your phone number feels comforting, but it’s also plagued by hackers looking for new methods of attack.   If you are holding your phone, is it safe to get a text with a confirmation code sent to your device? Hackers have ways …

tracing apps

COVID Tracing Apps. Mask Up, Digitally.

Many people are feeling hopeful in many areas about receiving their COVID vaccine. A welcome shift from the uncertainty and confusion of the last year. But there are now new challenges to be faced. Among them, the discussion of requiring a vaccine or immunity passport for individuals to take part in activities like international travel, as well as more minor …

passwordless

It’s Passwords, All the Way Down

We seem enamored with the idea of a ‘passwordless’ society. Not just because it would be an indicator of secure networks, but because trying to keep track of tens of unique, complex passwords is not ideal. There has been plenty of industry and media buzz around the concept of passwordless authentication strategies. Particular attention is paid to strategies like biometrics—which …