Among the many cybersecurity lessons we learned in 2017, the vulnerability of plain passwords was a recurring one. Every year, millions of usernames and passwords are stolen and sold in dark web markets, and as a result, many unsuspecting users fall victim to data theft, social engineering scams, identity theft and other cyber attacks. In this regard, 2017 was no different. [...]
Ask any security expert how you should protect your employees against hackers, and one of the first things they’ll tell you is to setup two-factor or multifactor authentication (2FA/MFA) for your online services and business applications. And they’re right. 2FA/MFA will protect your business’s sensitive data and resources against a host of cyberattacks and security incidents, including phishing scams, data breaches, [...]
In 2016, a hacker group going by the name of OurMine took over the Twitter and Pinterest accounts of Facebook CEO Mark Zuckerberg. However, the hackers didn’t employ any secret tricks or tools to access Zuckerberg’s account—they came right through the front door, using his poorly chosen password, “dadada.” How did OurMine gain access to Zuck’s Twitter and Pinterest passwords? In [...]
In the run-up to the 2016 U.S. presidential elections, Democratic candidate Hillary Clinton received a serious blow from a series of leaks coming from the email account of her campaign chairman John Podesta. Hackers were able to access the contents of Podesta’s account by staging a successful phishing attack and stealing his credentials.pass Podesta is one of the millions of people [...]
Virtual Private Networks (VPN) are hugely popular among companies and organizations that want to give their employees remote access to their private servers. By creating secure connections between remote nodes and your servers, VPNs solve some very important problems, such as preventing hackers from finding and breaking into your servers while enabling your employees to securely access their corporate files and [...]
Digital signatures, the electronic equivalent of handwritten signatures and stamped seals, have become a cornerstone of online security.
How can you make sure that only you can access the critical functionality and information of your servers?
One way to ensure that the secrets we have are top-notch is by eliminating the password altogether – and instead, using a strong mobile authenticator to execute authentication.
Two factor methods help improve user account security make it considerably harder for cybercriminals to gain unwanted access to a Linux machine.
Providing secure and easy-to-use authentication and login mechanisms should be one of the main goals every online service pursues. Unfortunately, passwords, the traditional method to protect online accounts and keep intruders out, are becoming less reliable and more cumbersome to maintain, both for users as well as service providers. The industry has become in desperate need for a no-password option. Where [...]