Multi Factor Authentication

Read all about the best Multi Factor Authentication methods on the Octopusblog. Learn about the difference between authentication factors and there pros and cons.

Getting back to normal: secure work in a post-coronavirus world 

By Raz Rafaeli|May 25th, 2020|Categories: Articles|Tags: , , , , |

For the second time in a few short months, we are entering uncharted territory. After having to adjust to unprecedented lockdowns and near standstill of economic activity, now businesses worldwide are slowly, and with cautious optimism, getting back to some regular routine.   The truth is, no one knows what the new normal will look like. But one thing is clear - as organizations prepare to resume operations, we have to fundamentally rethink many of our [...]

2FA VS Passwordless Authentication – Equal Enterprise Security?

By Inbal Voitiz|May 12th, 2020|Categories: Articles|Tags: , , , , |

Enterprise security is a fight to the death. It’s rough out there! Passwords are ridiculously easy to guess, and the ones that aren't are almost as easily stolen. Just look at the countless high profile server breaches that leaked millions of end-user passwords over the years. It’s banks and businesses, not just consumers, that end up paying when hackers use stolen credentials to raid bank [...]

Supply Chain attacks: mitigating hidden risks with Passwordless Authentication

By Inbal Voitiz|April 27th, 2020|Categories: Articles|Tags: , , , |

In today’s globalized world where efficiency and speed are paramount, no organization is an island. Inevitably, we all must place trust into vendors, third-party services, and software providers to keep the business going.  As a direct consequence of the global move towards distributed enterprise, hackers are increasingly utilizing blind spots in supply chains to target organizations for financial gains and other [...]

Universities and Cyber Security: A Lesson From Iranian Hackers

By Shimrit Tzur-David|April 13th, 2020|Categories: Articles|Tags: , , , , , |

Well before the COVID-19 pandemic, the headlines were dominated once again by the notion of state-sponsored cyberwarfare. Due to the surge in tensions between Iran and the U.S., and in the wake of the strike that killed top Iranian commander Qassem Soleimani, the Department of Homeland Security issued a warning of a potential retaliatory cyberattack by Iran or its proxies. But [...]

The Future of Corporate VPN

By Raz Rafaeli|March 31st, 2020|Categories: Articles|Tags: , , , |

As countries engage in and extend lockdowns and quarantines due to the coronavirus pandemic, companies, organizations, and government agencies are learning to cope with the new work-from-home culture. One of the most important challenges that every organization faces is providing its employees with secure and stable access to their corporate applications and resources. In this regard, several trends can be observed, [...]

10 Security Tips For The Remote Workforce

By Inbal Voitiz|March 18th, 2020|Categories: Articles|Tags: , , , , |

1 Phishing is on the rise Attackers acted fast to take advantage of the current Coronavirus health scare. Research shows that customized phishing campaigns intended to steal credentials and spread malware are increasing. Make sure employees use MFA solutions to decrease credential theft risks. Remind everyone - do not click links or open attachments unless sure about the source.   2 [...]

Enabling Remote Work While Ensuring Maximum Security

By Inbal Voitiz|March 16th, 2020|Categories: Articles|Tags: , , , , , , , , , |

In just a few short weeks, remote work has morphed from a perk offered mostly by tech companies to an absolute necessity, as the COVID-19 epidemic continues to disrupt the daily lives of millions of people. Suddenly, companies are forced to enable their employees to work from home on a massive scale, while keeping their productivity up. Oracle, Apple, Google, and [...]

SIM Swapping – The End Of 2nd Factor Authentication?

By Shimrit Tzur-David|February 24th, 2020|Categories: Articles|Tags: , , |

Many online services allow, and sometimes require, users to secure their accounts with a registered mobile phone number. This is a common and trusted method for two-factor authentication (2FA), using a phone call or an SMS message to verify identity when logging in from a new device or resetting a password. This standard approach, however, is not always effective in keeping [...]

Cloud Phishing Risks and Mitigation

By Shimrit Tzur-David|February 13th, 2020|Categories: Articles|Tags: , , , , |

If you’re running your business in the cloud, you need secure authentication Most of us underestimate the ramifications of password hacks and cloud phishing attacks. If your password falls into the wrong hands, a hacker will gain access to sensitive information, siphon your bank account, or do some other evil act that will inflict damage on your person or organization. But [...]

Cloud Identity Management Challenges

By Amit Rahav|February 4th, 2020|Categories: Articles|Tags: , , , , |

For years, enterprises have been rapidly adopting cloud technologies for many of their data processing tasks. The area of identity management is no exception. To this day, it is still a particularly fast-growing trend within the cloud revolution. Cloud Identity providers, or IDPs, have been taking the world of IT by storm. According to an estimate from Gartner, cloud-based identity is [...]

Passwordless Authentication is BOOMING

By Inbal Voitiz|January 1st, 2020|Categories: Articles|Tags: , , , , |

We’ve always understood security and usability to have an inverse relationship. Passwords are fundamentally flawed. They offer the worst of both worlds – poor usability and poor security. But what if I told you that by letting go of passwords we can finally make usability and security work together, not against each other?

Password Managers – Convenience is Not Security

By Shimrit Tzur-David|November 13th, 2019|Categories: Articles|Tags: , , |

Project Zero has recently disclosed that a security vulnerability left some of LastPass 16 million users exposed to the risk of credential compromise. In an ironic twist, LastPass, the supposedly secure gatekeeper of passwords, could leak the last password used to any website visited.  The vulnerability has since been patched, but maybe it is time we asked ourselves, why the heck [...]

True Cost of Password Based Authentication

By Amit Rahav|October 3rd, 2019|Categories: Articles|Tags: , , , |

Just because you don’t have to pay anything extra to buy this common form of authentication, it doesn’t mean that passwords are free.  Far from it, quite often passwords end up costing enterprises much more than what they have bargained for. Although the cost of passwords rarely comes up in management meetings, authenticating identity using passwords is a significant expense for [...]

x

Get in Touch

x

Get in Touch With Sales

x

Leaving Already?

Get our solution overview to learn how we can finally rid your company of passwords!