Multi Factor Authentication

Read all about the best Multi Factor Authentication methods on the Octopusblog. Learn about the difference between authentication factors and there pros and cons.

What you need to know about password vulnerabilities (Pt. 2)

By Amit Rahav|February 7th, 2018|Categories: Articles|Tags: , , , |

In our last post, we delved into how threats from the outside capitalize on common password vulnerabilities. No matter how well an enterprise is strengthened against external dangers, passwords will still present security threats that emanate from the inside. Here’s the breakdown of common password vulnerabilities: Simple passwords - Weak Passwords Risk As computing power becomes increasingly available at affordable prices, [...]

The Future of Multi Factor Authentication

By Amit Rahav|January 1st, 2018|Categories: Articles|Tags: , , |

In the run-up to the 2016 U.S. presidential elections, Democratic candidate Hillary Clinton received a serious blow from a series of leaks coming from the email account of her campaign chairman John Podesta. Hackers were able to access the contents of Podesta’s account by staging a successful phishing attack and stealing his credentials.pass Podesta is one of the millions of people [...]

Why your corporate VPN needs two-factor authentication (2FA)

By Amit Rahav|December 13th, 2017|Categories: Articles|Tags: , , |

Virtual Private Networks (VPN) are hugely popular among companies and organizations that want to give their employees remote access to their private servers. By creating secure connections between remote nodes and your servers, VPNs solve some very important problems, such as preventing hackers from finding and breaking into your servers while enabling your employees to securely access their corporate files and [...]

Multi Factor Authentication with Office 365

By Amit Rahav|December 6th, 2017|Categories: Articles|Tags: , , |

Office 365 is one of the most popular sets of subscription suites for productivity software used at the corporate level. The compatibility to a wide spectrum of operating systems and the variety of programs available on Office, make it an obvious choices for many medium size to large businesses. Weak Links in the Chain Office comes with its vulnerabilities, however. The [...]

Congressional crackdown on data protection law has begun

By Amit Rahav|October 9th, 2017|Categories: Articles|Tags: , , , |

Following a series of national level cyber incidents, federal lawmakers in the United States are beginning to take steps to clamp down on standards for data protection law as well as the big companies that make up the tech industry. One of the biggest wake up calls to Washington was the Equifax breach in mid-September, the hack that has come to [...]

What’s the Difference Between Authentication and Authorization?

By Secret Double Octopus Staff|September 19th, 2017|Categories: Articles|Tags: , , , , |

In order to protect sensitive data and operations from unwanted access by intruders and malicious actors, developers integrated authentication and authorization features into their applications. Whether you’re running a banking app, a social media website or a blogging platform, these are the two key functionalities that will seal your application against security incidents. While the two terms are often used interchangeably, [...]

x

Get in Touch

x

Get in Touch With Sales