Read all about the best Multi Factor Authentication methods on the Octopusblog. Learn about the best authentication techniques for different operating systems, the flaws of single-sign-on, and the most up-to-date technologies for multi-factor, such as SMS, and push notifications.

How Does Passwordless Authentication Work?

By |April 8th, 2019|Categories: Articles|Tags: , , , |

What is Passwordless Authentication? Passwordless authentication is any method of verifying the identity of a user that does not require the user to provide a password. Instead of passwords, proof of identity can be done based on possession of something that uniquely identifies the user (e.g. a one-time password generator, a registered mobile device, or a hardware token), or the user’s [...]

Securing Remote Access – The Guide

By |January 24th, 2019|Categories: Articles|Tags: , , |

Among the elements of cybersecurity, the human factor in data security continues to be the most difficult to control--and cybercriminals know it. Of all the areas of a network vulnerable to human error, remote access channels are probably most susceptible to attack and a likely route for hackers trying to breach an organization. Common remote access solutions targeted by hackers include [...]

How to Evaluate Push Authentication Solutions

By |January 21st, 2019|Categories: Articles|Tags: , , |

It should come as no surprise that the global market for multi-factor authentication (MFA) technology is expected to grow fourfold by 2025. On the one hand, software continues to eat the world and online services are becoming increasingly important in every aspect of daily life, business, health care, politics, military, etc. On the other hand, data breaches are also rising in [...]

Preventing Corporate Account Takeover (CATO)

By |January 14th, 2019|Categories: Articles|Tags: , , |

Businesses of all types and sizes present attractive targets for today’s cybercriminals. This is due to the simple fact that user accounts attached to organizations tend to give access to more assets than private ones. As the sophistication of cyber criminals has increased, the threat of the Corporate Account Takeover (CATO) has grown in tandem. For years, incidents of CATO have, [...]

How will Authentication Look Like in 2019

By |January 2nd, 2019|Categories: Articles|Tags: , , |

With 2019 starting, it’s a good time to look back at 2018 to remember the lessons learned from security incidents involving user authentication and examine how the landscape will look like in the next year.   Poor passwords continue to take their toll Like every year, 2018 taught us that poor passwords haven’t gone away, and they continue to give hackers [...]

Passwordless Authentication will Become a Business Advantage in 2019

By |January 1st, 2019|Categories: In the News|Tags: , , |

Published at TechRadar on December 31st by Raz Rafaeli  At RSA’s 2004 security conference, Bill Gates predicted “There is no doubt that over time, people are going to rely less and less on passwords,” adding that passwords “just don’t meet the challenge for anything you really want to secure.” A pertinent truth that is often forgotten when discussing the importance of [...]

Virtual Desktop (VDI) Authentication

By |December 20th, 2018|Categories: Articles|Tags: , , , |

The Bring Your Own Device (BYOD) approach is highly embraced by organizations, connecting users to corporate networks to reduce costs or as an easy solution for remote workers. The main beneficiaries of the trend are Virtual Desktop Infrastructure (VDI) such as Citrix, VMware and Microsoft,  For many organizations and companies, Virtual Desktops provide an interesting option to connect their employees to [...]

Privileged Users are Privileged Targets

By |December 17th, 2018|Categories: Articles|Tags: , , |

By any measurement, Privileged Access Management (PAM) has drastically changed the way enterprises protect access to critical systems. Using credential vaults and other session control tools, PAM has allowed managers to maintain privileged identities while significantly decreasing the risk of their compromise. Both industry leaders Forrester and Gartner have placed privileged management as a top priority for CISO’s. And it’s no [...]

Password- Based Authentication: Vulnerabilities And Alternative Solutions

By |December 5th, 2018|Categories: Articles|Tags: , , , , , |

The password has been the staple of authentication for years. While passwords are still very much a part of our information technology landscape, they have been on the decline for more than a decade. “There is no doubt that over time, people are going to rely less and less on passwords,” adding that passwords “just don’t meet the challenge for anything [...]

Credential Stuffing – HSBC Case Study

By |November 26th, 2018|Categories: Articles|Tags: , , |

Earlier this month, HSBC Bank, one of the seven largest financial organizations in the world, issued a warning to its customers that their personal information may have been compromised in a recent data breach. HSBC officials say the breach appeared to run from the 4th through the 14th of October. After spotting the breach, the bank announced that it had "suspended [...]

VPN MFA – The Gateway to the Kingdom

By |November 22nd, 2018|Categories: Articles|Tags: , , |

Enterprises have long used Virtual Private Networks (VPN) to protect their systems and provide a secure work environment. In today’s dynamic business climate, VPN’s have become even more essential. Private networks are now commonly used for organizations that want to give their employees remote, unfettered access to their private servers. With the security and flexibility they provide, it’s no wonder why [...]

Man in the Browser (MITB)

By |November 1st, 2018|Categories: Articles|Tags: , , |

On the Octopus Blog, we take a keen interest in the most prevalent hacks used by cybercriminals today. Understanding the science and methodology behind these attacks can help users be better prepared and equipped to protect their data and digital identities. Among the more nefarious techniques employed by hackers, the Man-in-the-Middle (MITM) is a particularly nasty one. A well-executed attack can [...]

The UN Unexpected Example of Poor Password Management

By |October 4th, 2018|Categories: Articles|Tags: , , , |

A couple weeks ago, we covered the West Australian government’s security audit here on the Octopus Blog. The section of the governmental audit’s research into cyber security practices unveiled some pretty disturbing facts. Given the opportunity, users will choose the most obvious, easiest to guess passwords, leaving them wide-open targets for cyber criminals. While the size and scope of this phenomenon [...]

Howdy,
Search exact
Search sentence
Buy Premium Version to add more powerful tools to this place. https://wpclever.net/downloads/wp-admin-smart-search