3 Pillars of Digital Transformation: Cost, Usability, and Security

By Shimrit Tzur-David|June 30th, 2020|Categories: Articles|Tags: , , , , , , |

Digital transformation is nothing new. Enterprises have been striving to achieve digital El Dorado for over a decade now, looking to solve usability and security issues and improve the quality of work and service. Yet, the progress has been slow, to say the least. It’s not that companies do not understand the value. It has been widely accepted that digital transformation is THE thing to strive for. After all, digital-first [...]

How to handle passwords under GDPR

By Inbal Voitiz|June 22nd, 2020|Categories: Articles|Tags: , , , , , , |

Two key regulations that have impacted the security and privacy landscape are the European Unions General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA). Although both legislations are applicable to their own jurisdictions, they have considerable impact on how companies around the globe operate. We live in a globalized online economy, where your business can have customers across the world, and you should be careful not to run afoul of any of these regulatory measures, and others [...]

Put a PIN in that: why passwords vs. PINs comparisons are irrelevant

By Inbal Voitiz|June 9th, 2020|Categories: Articles|Tags: , , , , , , |

Your IT: "Your account is now secured with a PIN, adding an extra layer of security to your account." Your Users: "Great idea! I'll just use my credit card PIN, and now I will always remember my computer PIN too!"  Many security managers have struggled with similar exchanges in recent years, as the business world continuously examines added security layers for  employees and users [...]

Proud to Present: Octopus Authentication Version 4.6!

By Secret Double Octopus Staff|May 26th, 2020|Categories: Articles, In the News|Tags: |

We’re very happy to announce the release of a brand new version of Octopus Authentication. Version 4.6 contains significant additions and upgrades including: Full integration with ForgeRock directories Improved 3rd Party Authenticators support Configuration of concurrent multiple authenticators Free choice of authentication method allowed on each user directory One Time Password (OTP) for Windows workstations, whether online or offline 3rd party [...]

Getting back to normal: secure work in a post-coronavirus world 

By Raz Rafaeli|May 25th, 2020|Categories: Articles|Tags: , , , , |

For the second time in a few short months, we are entering uncharted territory. After having to adjust to unprecedented lockdowns and near standstill of economic activity, now businesses worldwide are slowly, and with cautious optimism, getting back to some regular routine.   The truth is, no one knows what the new normal will look like. But one thing is clear - as organizations prepare to resume operations, we have to fundamentally rethink many of our [...]

2FA VS Passwordless Authentication – Equal Enterprise Security?

By Inbal Voitiz|May 12th, 2020|Categories: Articles|Tags: , , , , |

Enterprise security is a fight to the death. It’s rough out there! Passwords are ridiculously easy to guess, and the ones that aren't are almost as easily stolen. Just look at the countless high profile server breaches that leaked millions of end-user passwords over the years. It’s banks and businesses, not just consumers, that end up paying when hackers use stolen credentials to raid bank [...]

Supply Chain attacks: mitigating hidden risks with Passwordless Authentication

By Inbal Voitiz|April 27th, 2020|Categories: Articles|Tags: , , , |

In today’s globalized world where efficiency and speed are paramount, no organization is an island. Inevitably, we all must place trust into vendors, third-party services, and software providers to keep the business going.  As a direct consequence of the global move towards distributed enterprise, hackers are increasingly utilizing blind spots in supply chains to target organizations for financial gains and other [...]

Universities and Cyber Security: A Lesson From Iranian Hackers

By Shimrit Tzur-David|April 13th, 2020|Categories: Articles|Tags: , , , , , |

Well before the COVID-19 pandemic, the headlines were dominated once again by the notion of state-sponsored cyberwarfare. Due to the surge in tensions between Iran and the U.S., and in the wake of the strike that killed top Iranian commander Qassem Soleimani, the Department of Homeland Security issued a warning of a potential retaliatory cyberattack by Iran or its proxies. But [...]

The Future of Corporate VPN

By Raz Rafaeli|March 31st, 2020|Categories: Articles|Tags: , , , |

As countries engage in and extend lockdowns and quarantines due to the coronavirus pandemic, companies, organizations, and government agencies are learning to cope with the new work-from-home culture. One of the most important challenges that every organization faces is providing its employees with secure and stable access to their corporate applications and resources. In this regard, several trends can be observed, [...]

10 Security Tips For The Remote Workforce

By Inbal Voitiz|March 18th, 2020|Categories: Articles|Tags: , , , , |

1 Phishing is on the rise Attackers acted fast to take advantage of the current Coronavirus health scare. Research shows that customized phishing campaigns intended to steal credentials and spread malware are increasing. Make sure employees use MFA solutions to decrease credential theft risks. Remind everyone - do not click links or open attachments unless sure about the source.   2 [...]

Enabling Remote Work While Ensuring Maximum Security

By Inbal Voitiz|March 16th, 2020|Categories: Articles|Tags: , , , , , , , , , |

In just a few short weeks, remote work has morphed from a perk offered mostly by tech companies to an absolute necessity, as the COVID-19 epidemic continues to disrupt the daily lives of millions of people. Suddenly, companies are forced to enable their employees to work from home on a massive scale, while keeping their productivity up. Oracle, Apple, Google, and [...]

Active Directory In The Age Of The Cloud

By Raz Rafaeli|March 4th, 2020|Categories: Articles|Tags: , , |

For IT pros, Microsoft Active Directory is an old friend. After all, it’s been with us since the early 2000s and (just like many Microsoft products before it) it has, over time, become the backbone of many enterprises IT operations.  Originally developed to manage network resources, AD’s functionality has expanded over the years to embrace many aspects of authentication and identity [...]

SIM Swapping – The End Of 2nd Factor Authentication?

By Shimrit Tzur-David|February 24th, 2020|Categories: Articles|Tags: , , |

Many online services allow, and sometimes require, users to secure their accounts with a registered mobile phone number. This is a common and trusted method for two-factor authentication (2FA), using a phone call or an SMS message to verify identity when logging in from a new device or resetting a password. This standard approach, however, is not always effective in keeping [...]

x

Get in Touch

x

Get in Touch With Sales

x

Leaving Already?

Get our solution overview to learn how we can finally rid your company of passwords!