Password Alternatives

Learn all about password-alternatives on the Octopusblog. Read about how Octopus Authenticator tools are replacing traditional password based methods.

What Will Authentication Look Like in 2018

By Amit Rahav|March 6th, 2018|Categories: Articles|Tags: , |

Among the many cybersecurity lessons we learned in 2017, the vulnerability of plain passwords was a recurring one. Every year, millions of usernames and passwords are stolen and sold in dark web markets, and as a result, many unsuspecting users fall victim to data theft, social engineering scams, identity theft and other cyber attacks. In this regard, 2017 was no different. [...]

What you need to know about password vulnerabilities (Pt. 2)

By Amit Rahav|February 7th, 2018|Categories: Articles|Tags: , , , |

In our last post, we delved into how threats from the outside capitalize on common password vulnerabilities. No matter how well an enterprise is strengthened against external dangers, passwords will still present security threats that emanate from the inside. Here’s the breakdown of common password vulnerabilities: Simple passwords - Weak Passwords Risk As computing power becomes increasingly available at affordable prices, [...]

Poor Visibility, Weak Passwords Compromise Active Directory

By Secret Double Octopus Staff|February 5th, 2018|Categories: In the News|Tags: , , |

Published in DarkReading on 1 February 2018, by Kelly Sheridan Every company has different security challenges. One common hurdle is securing Active Directory, which remains a critical issue because it's used to store increasing amounts of data. Businesses face a major risk in granting access to too many people without knowing who is safe. "Active Directory was put in decades ago, and many [...]

What you need to know about password vulnerabilities (Pt. 1)

By Amit Rahav|February 1st, 2018|Categories: Articles|Tags: , |

In 2016, a hacker group going by the name of OurMine took over the Twitter and Pinterest accounts of Facebook CEO Mark Zuckerberg. However, the hackers didn’t employ any secret tricks or tools to access Zuckerberg’s account—they came right through the front door, using his poorly chosen password, “dadada.” How did OurMine gain access to Zuck’s Twitter and Pinterest passwords? In [...]

How Push Notifications can Revolutionize your Identity Security

By Shimrit Tzur-David|January 23rd, 2018|Categories: Articles|Tags: , , |

The many horror stories that regularly surface on the web make it certain beyond the shadow of a doubt that plain passwords are a cumbersome and bad security practice. A recent survey by Secret Double Octopus found that the outstanding majority of corporate employees are eyeing password-free technologies as their preferred method of authentication, both from a security and an ease-of-use [...]

Why employees are a businesses weakest link – and how to remedy that

By Secret Double Octopus Staff|January 22nd, 2018|Categories: In the News|Tags: , |

Published in Information-Age, on 18 January 2018, by Raz Rafaeli “People are our greatest asset,” proclaim companies all across the land – but that motto would perhaps be most appropriate to Hacker Incorporated, the loosely-affiliated organisation of cyber-baddies that has made a very successful business of invading computers and networks, for fun and great profit. The requirements for effective cyber-protection in a [...]

The Future of Multi Factor Authentication

By Amit Rahav|January 1st, 2018|Categories: Articles|Tags: , , |

In the run-up to the 2016 U.S. presidential elections, Democratic candidate Hillary Clinton received a serious blow from a series of leaks coming from the email account of her campaign chairman John Podesta. Hackers were able to access the contents of Podesta’s account by staging a successful phishing attack and stealing his credentials.pass Podesta is one of the millions of people [...]

Survey Maps User Preferences of Leading Authentication Tools

By Amit Rahav|October 31st, 2017|Categories: Articles|Tags: , , , , |

For the full report go to: In with the new, out with the old This pretty much sums up the dominating trends in authentication methods over the past several years. With many traditional methods depreciated, more and more replacement technologies have been making an entrance into the market. The question for businesses is which particular method will be the most adequate [...]

Secret Double Octopus Survey Examines User Preferences for Password Alternatives

By Secret Double Octopus Staff|October 31st, 2017|Categories: Press Release|Tags: , , , |

Tel Aviv, Israel- October 30, 2017- The results of a survey conducted by Secret Double Octopus, the pioneer of password-free, keyless authentication technology, found that among employees of medium (1000-5000) and large (5000+) enterprises, 81% of respondents perceive Face ID as trustworthy and 91% think it will be easy to use. Currently, Touch ID is the leading alternative to passwords with [...]


Get in Touch


Get in Touch With Sales