Posts Tagged ‘two-factor authentication’
7 Top Cybersecurity Trends in 2019
Forty-three percent of businesses were a victim of a cybersecurity breach in the past year, based on the recent Cyber Security Breaches Survey 2018. Organizations are continuing to do a less than stellar job protecting their users’ data from inadvertent exposure, such as exposed APIs, poor authentication, etc. In fact, 4.5 billion data records were…
Read MoreWhat Types of Threats and Encryption Will We See in 2019?
What were the biggest cybersecurity concerns of 2018? What will the biggest technology trends be in 2019? Mark is interviewed about threats and encryption, taking a look at cybersecurity in 2018 and a look ahead to 2019. Check out the Q&A in Solutions Review.
Read MoreThe PKI Guy talks digital identity with Kevin von Keyserling of Keyfactor
Q&A with Kevin von Keyserling, CEO and co-founder, Keyfactor TPG: Tell us about Keyfactor. KvK: We’re a digital identity software company that provides end-to-end authentication, encryption, and signing technologies that safeguard data, devices, applications, and people. Our platform allows our clients to master every digital identity within their organization quickly, easily and cost-effectively. Up until a…
Read MoreBoost Security in Your Organization with Tactical Two-Factor Authentication
For business applications, two-factor authentication is a must, especially for any employee or user accounts that have access to sensitive applications or customer information. Mark explains how automating and integrating two-factor authentication technology is a vital step to guarding against security breaches. Check out his latest article in ISACA’s The Nexus.
Read MoreStay Safer Online With Two-Factor Authentication
According to Pew Research Center, 84 percent of adults rely primarily on memorization or pen and paper to store passwords. But we know that storing passwords on paper could lead to exposure. Instead, using a complex password, combined with password management, and two-factor or multi-factor authentication can help greatly reduce risks. Especially with phishing on…
Read More