Finding the Best Mobile Authentication Solution for your Enterprise

In the rapidly growing industry of advanced authentication, mobile solutions play a central role. Mobile apps for authentication have growing in popularity for quite some time. Researchers at Gartner predicted in 2017 that the majority of users would implement some form of mobile authentication in the coming years. Two important factors are driving this trend. First is from the security angle. [...]

By | 2018-02-21T22:24:20+00:00 February 21st, 2018|Categories: Articles|Tags: , , |

What is the Total Cost of Deploying Multi Factor Authentication for your Business?

Ask any security expert how you should protect your employees against hackers, and one of the first things they’ll tell you is to setup two-factor or multifactor authentication (2FA/MFA) for your online services and business applications. And they’re right. 2FA/MFA will protect your business’s sensitive data and resources against a host of cyberattacks and security incidents, including phishing scams, data breaches, [...]

By | 2018-02-19T15:53:37+00:00 February 14th, 2018|Categories: Articles|Tags: , , |

What you need to know about password vulnerabilities (Pt. 2)

In our last post, we delved into how threats from the outside capitalize on common password vulnerabilities. No matter how well an enterprise is strengthened against external dangers, passwords will still present security threats that emanate from the inside. Here’s the breakdown of common password vulnerabilities: Simple passwords - Weak Passwords Risk As computing power becomes increasingly available at affordable prices, [...]

Poor Visibility, Weak Passwords Compromise Active Directory

Published in DarkReading on 1 February 2018, by Kelly Sheridan Every company has different security challenges. One common hurdle is securing Active Directory, which remains a critical issue because it's used to store increasing amounts of data. Businesses face a major risk in granting access to too many people without knowing who is safe. "Active Directory was put in decades ago, and many [...]

By | 2018-02-05T16:22:05+00:00 February 5th, 2018|Categories: In the News|Tags: , , |

What you need to know about password vulnerabilities (Pt. 1)

In 2016, a hacker group going by the name of OurMine took over the Twitter and Pinterest accounts of Facebook CEO Mark Zuckerberg. However, the hackers didn’t employ any secret tricks or tools to access Zuckerberg’s account—they came right through the front door, using his poorly chosen password, “dadada.” How did OurMine gain access to Zuck’s Twitter and Pinterest passwords? In [...]

By | 2018-02-06T07:12:25+00:00 February 1st, 2018|Categories: Articles|Tags: , |

How push notifications can revolutionize your authentication security

The many horror stories that regularly surface on the web make it certain beyond the shadow of a doubt that plain passwords are a cumbersome and bad security practice. A recent survey by Secret Double Octopus found that the outstanding majority of corporate employees are eyeing password-free technologies as their preferred method of authentication, both from a security and an ease-of-use [...]

By | 2018-01-25T09:56:17+00:00 January 23rd, 2018|Categories: Articles|Tags: , |

Why employees are a businesses weakest link – and how to remedy that

Published in Information-Age, on 18 January 2018, by Raz Rafaeli “People are our greatest asset,” proclaim companies all across the land – but that motto would perhaps be most appropriate to Hacker Incorporated, the loosely-affiliated organisation of cyber-baddies that has made a very successful business of invading computers and networks, for fun and great profit. The requirements for effective cyber-protection in a [...]

By | 2018-01-22T10:31:03+00:00 January 22nd, 2018|Categories: In the News|Tags: , |

Password-Free, High Assurance Authentication for Active Directory Domains

With the release of this new solution, Secret Double Octopus has delivered the first authentication tool for AD that completely unburdens users from passwords while offering a more secure model.   Get a demo here  Seamless Authentication for Users, No Compromise on Security Administrators of an organization’s AD access their control of resources through passwords. This means that a just one [...]

By | 2018-01-17T13:07:18+00:00 January 17th, 2018|Categories: Articles|Tags: , , |

The Quantum Computing Apocalypse is Imminent

Published by TechCrunch on January 05, 2018, by Shlomi Dolev In the ancient world, they used cubits as an important data unit, but the new data unit of the future is the qubit — the quantum bits that will change the face of computing. According to experts, quantum computers will be able to create breakthroughs in many of the most complicated [...]

By | 2018-02-21T15:48:21+00:00 January 14th, 2018|Categories: In the News|Tags: |

The Future of Multi Factor Authentication

In the run-up to the 2016 U.S. presidential elections, Democratic candidate Hillary Clinton received a serious blow from a series of leaks coming from the email account of her campaign chairman John Podesta. Hackers were able to access the contents of Podesta’s account by staging a successful phishing attack and stealing his credentials.pass Podesta is one of the millions of people [...]

By | 2018-01-01T13:38:09+00:00 January 1st, 2018|Categories: Articles|Tags: , , , |