Cybersecure

Cultivating a Cybersecure Culture at Work is Everyone’s Responsibility

Businesses often say that their people are their greatest asset. When it comes to cybersecurity, this statement is truer than you might think. A constantly shifting threat landscape means cybersecurity best practices should be on everyone’s mind, not just your CTO or CISO. When employees of all areas, from new hires to the executive suite, are equipped to understand and …

multi-factor authentication

What Does It Take to Be Secure with Multi-Factor Authentication?

In our four-part series investigating the vulnerabilities of multi-factor authentication (MFA), we’ve learned a lot about the methods hackers use to crack these systems. Social engineering, technical hacks, and a mixture of both can all play a role in weakening the authentication factors we depend on to protect our business’s critical data. The truth is that cybersecurity measures can’t be …

MFA

Cracking Multi-Factor Authentication on the Cheap

Over the last few years, Multi-Factor Authentication (MFA) use has become more common across industries. Having MFA associated with your phone number feels comforting, but it’s also plagued by hackers looking for new methods of attack.   If you are holding your phone, is it safe to get a text with a confirmation code sent to your device? Hackers have ways …

state of password security 451

Response Required

Why organizations need to react urgently to the state of password security, according to data from 451 Research In a recent brief titled “Love ‘em or Hate ‘em, Passwords Are Here to Stay,” 451 Research indicated that despite the stirrings of a passwordless revolution, the widespread use of passwords won’t be changing in the foreseeable future. The 451 brief points …

Enzoic CEO, Michael Greene was recently in CyberEd.

CyberEd Magazine Session with Enzoic CEO Michael Greene

Enzoic CEO Michael Greene had a recent session with CyberEd. CyberEd.io provides the latest discussions on cybersecurity topics straight from industry leaders for the security practitioner on-the-go. Here is a quick summary of that session. Strong Authentication Hindering the User Experience Numerous options exist for strong authentication, but most involve introducing some form of friction into the user experience. User …

Strong Authentication vs. User Experience

Strong Authentication vs. User Experience

Balancing Made Easier All enterprises balance their need for strong authentication security against a frictionless user login process. Most fraud and account takeover security products focus on system integrity without much regard for user experience. Companies that position their security measures solely as enterprise protection can foster frustrating user experiences. And some strong authentication methods that can dissuade users: 2Factor …