Single-factor authentication (SFA) was the norm for many years before multi-factor authentication started gradually replacing it. In today’s era of highly developed information systems, most security experts agree that single-factor authentication simply isn’t enough to keep you safe.
Since 2014, theNational Institute of Standards and Technologyhas issued guidelines, recommendations, and controls for identity authentication, including optimal password policy practices. The NIST password guidelines cover crucial practices for creating and managing passwords and requirements for the validation of these passwords
Passwords are flawed, and nowadays, obsolete methods of authentication. For this reason, cybersecurity companies have developed more sophisticated authentication methods for ensuring enhanced user security. The most notable examples are hardware tokens, dedicated portable devices that authenticate the user’s identity and prevent unauthorized access.
The CCPA, California Consumer Privacy Act, has been legally enforceable since July 1st of last year. It is the first significant privacy law in the US pertaining to consumer control of personal data. And, even though it hasn’t even been a year since the official legal enforcement of the CCPA started, Californians have already voted for the follow-up act, called the California Privacy Rights Act (CPRA).
Webinar on passwordless authentication and its implementation in the business environment. Discussion topics:🔺Will the FIDO standard replace passwords? 🔺The magic of FIDO passwordless authentication. 🔺 Case studies of Fast Identity🔺Questions and answers
Hideez Group, together with the Institute of Information Technologies JSC, presented a new tool for secure data storage - the Almaz-1K electronic key, which supports Bluetooth wireless technology.
Doctors and nurses are leading the fight for human lives amidst the coronavirus outbreak. Once again, they rise to the challenge, providing help for those in need, and giving hope to others. What they need right now is time. Time to treat current patients and time to get ready for the new ones.
There’s a dramatic increase in phishing and other breach attempts as cybercriminals are increasingly seeking to profit off the coronavirus panic. How do you protect your organization from such attacks? Read more:
The NYDFS Cybersecurity Regulation is a set of regulations from the New York Department of Financial Services. This legislation places cybersecurity requirements on all financial institutions that operate in New York. It stipulates that all DFS-regulated companies should have cybersecurity plans, policies, and maintain detailed reporting systems for cybersecurity events.
In the United States, about 19% of the adult population has experienced identity theft. Over 60 million Americans have had their online identity exposed by hacks of the customer databases of their service providers or government agencies. The situation is similar in Europe and other countries.
Staff members can fall victim to many different security threats, companies can never be secure enough when it comes to safeguarding their sensitive information. Continue reading to find out the best practices for employees and how to implement them to improve employee cybersecurity awareness going into 2020.
Zero Trust architecture has experienced a meteoric rise over the past couple of years, and it became a go-to choice for many organizations looking for a reliable security system. Despite popularity among big and small companies, Zero Trust model remains relatively unknown among average Internet users.