Multi Factor Authentication

Read all about the best Multi Factor Authentication methods on the Octopusblog. Learn about the difference between authentication factors and there pros and cons.

Why Passwordless Authentication is Essential for VPN’s

By Shimrit Tzur-David|June 13th, 2018|Categories: Articles|Tags: , , |

As the modern workforce becomes increasingly more mobile, businesses are allocating more and more on resources to secure remote connections. For years, Virtual Private Networks, or VPNs, have been the standard bearer for remote access. VPNs allow users to transfer sensitive data across a public network as if their devices were directly connected to private one. The New Paradigm Unfortunately, the [...]

What to Look for in Identity and Access Management Solutions?

By Amit Rahav|June 11th, 2018|Categories: Articles|Tags: , , |

Effective identity and access management platform is likely the single most important responsibility for today’s chief information security officers (CiSO). Information and Access Management, or IAM, is the bread and butter of securing a network, ensuring access to data and applications is controlled and uncompromising. IAM plays a vital role in a company’s overall security framework. Having an effective strategy enables [...]

Why Are Software Tokens a Better Option

By Amit Rahav|June 5th, 2018|Categories: Articles|Tags: , |

Tokens form an important part of the authentication process. In our previous post, we looked at how tokens fit into this process, and the different types of tokens available. In this piece, we’ll take a closer look at hardware tokens versus software tokens, and take a glimpse into the future of which token is likely to be the most widely adopted [...]

Software Tokens Vs Hardware Tokens

By Amit Rahav|May 28th, 2018|Categories: Articles|Tags: , , , |

Proving your identity in order to authenticate yourself and gain access to some kind of system is more of a challenge than most people realize. This process has to be designed so that on one hand it’s as easy as possible for the user of the system to gain access, while on the other it’s as difficult as possible for someone [...]

Tackling the PCI’s New Authentication Regulations

By Shimrit Tzur-David|May 7th, 2018|Categories: Articles|Tags: , |

The latest standards governing the world of digital payments have come into effect. On 1 February 2018, the new Data Security Standards of the Payment Card Industry’s (PCI) Council, or PCI DSS, came into effect. These new standards upgraded many protocols that used to be merely “best practices”, to full requirements. The updated PCI DSS is a significant shift from earlier [...]

Blockchain Vulnerability to Man-in-the-middle Attacks

By Amit Rahav|April 11th, 2018|Categories: Articles|Tags: , |

Early February this year, researchers found a Man-in-the-middle (MITM) vulnerability in the popular Ledger hardware crypto wallet application that allowed hackers to redirect victims’ funds to their own wallets by changing the destination address of cryptocurrency transactions. The news came as a disappointment to users who considered hardware wallets such as Ledger as the most secure way to store their digital [...]

What Will Authentication Look Like in 2018

By Amit Rahav|March 6th, 2018|Categories: Articles|Tags: , |

Among the many cybersecurity lessons we learned in 2017, the vulnerability of plain passwords was a recurring one. Every year, millions of usernames and passwords are stolen and sold in dark web markets, and as a result, many unsuspecting users fall victim to data theft, social engineering scams, identity theft and other cyber attacks. In this regard, 2017 was no different. [...]

Finding the Best Mobile Authentication Solution for your Enterprise

By Amit Rahav|February 21st, 2018|Categories: Articles|Tags: , , |

In the rapidly growing industry of advanced authentication, mobile solutions play a central role. Mobile apps for authentication have growing in popularity for quite some time. Researchers at Gartner predicted in 2017 that the majority of users would implement some form of mobile authentication in the coming years. Two important factors are driving this trend. First is from the security angle. [...]

What is the Total Cost of Deploying Multi Factor Authentication for your Business?

By Amit Rahav|February 14th, 2018|Categories: Articles|Tags: , , |

Ask any security expert how you should protect your employees against hackers, and one of the first things they’ll tell you is to setup two-factor or multifactor authentication (2FA/MFA) for your online services and business applications. And they’re right. 2FA/MFA will protect your business’s sensitive data and resources against a host of cyberattacks and security incidents, including phishing scams, data breaches, [...]

What you need to know about password vulnerabilities (Pt. 2)

By Amit Rahav|February 7th, 2018|Categories: Articles|Tags: , , , |

In our last post, we delved into how threats from the outside capitalize on common password vulnerabilities. No matter how well an enterprise is strengthened against external dangers, passwords will still present security threats that emanate from the inside. Here’s the breakdown of common password vulnerabilities: Simple passwords - Weak Passwords Risk As computing power becomes increasingly available at affordable prices, [...]

The Future of Multi Factor Authentication

By Amit Rahav|January 1st, 2018|Categories: Articles|Tags: , , |

In the run-up to the 2016 U.S. presidential elections, Democratic candidate Hillary Clinton received a serious blow from a series of leaks coming from the email account of her campaign chairman John Podesta. Hackers were able to access the contents of Podesta’s account by staging a successful phishing attack and stealing his credentials.pass Podesta is one of the millions of people [...]

Why your corporate VPN needs two-factor authentication (2FA)

By Amit Rahav|December 13th, 2017|Categories: Articles|Tags: , , |

Virtual Private Networks (VPN) are hugely popular among companies and organizations that want to give their employees remote access to their private servers. By creating secure connections between remote nodes and your servers, VPNs solve some very important problems, such as preventing hackers from finding and breaking into your servers while enabling your employees to securely access their corporate files and [...]

Multi Factor Authentication with Office 365

By Amit Rahav|December 6th, 2017|Categories: Articles|Tags: , , |

Office 365 is one of the most popular sets of subscription suites for productivity software used at the corporate level. The compatibility to a wide spectrum of operating systems and the variety of programs available on Office, make it an obvious choices for many medium size to large businesses. Weak Links in the Chain Office comes with its vulnerabilities, however. The [...]