Webinar on passwordless authentication and its implementation in the business environment. Discussion topics:🔺Will the FIDO standard replace passwords? 🔺The magic of FIDO passwordless authentication. 🔺 Case studies of Fast Identity🔺Questions and answers
Hideez Group, together with the Institute of Information Technologies JSC, presented a new tool for secure data storage - the Almaz-1K electronic key, which supports Bluetooth wireless technology.
Doctors and nurses are leading the fight for human lives amidst the coronavirus outbreak. Once again, they rise to the challenge, providing help for those in need, and giving hope to others. What they need right now is time. Time to treat current patients and time to get ready for the new ones.
There’s a dramatic increase in phishing and other breach attempts as cybercriminals are increasingly seeking to profit off the coronavirus panic. How do you protect your organization from such attacks? Read more:
The NYDFS Cybersecurity Regulation is a set of regulations from the New York Department of Financial Services. This legislation places cybersecurity requirements on all financial institutions that operate in New York. It stipulates that all DFS-regulated companies should have cybersecurity plans, policies, and maintain detailed reporting systems for cybersecurity events.
In the United States, about 19% of the adult population has experienced identity theft. Over 60 million Americans have had their online identity exposed by hacks of the customer databases of their service providers or government agencies. The situation is similar in Europe and other countries.
Staff members can fall victim to many different security threats, companies can never be secure enough when it comes to safeguarding their sensitive information. Continue reading to find out the best practices for employees and how to implement them to improve employee cybersecurity awareness going into 2020.
Zero Trust architecture has experienced a meteoric rise over the past couple of years, and it became a go-to choice for many organizations looking for a reliable security system. Despite popularity among big and small companies, Zero Trust model remains relatively unknown among average Internet users.
The California Consumer Privacy Act, also known as CCPA, becomes effective on January 1, 2020. Its main goal is to secure personal information of individuals by obliging businesses to collect their consent before gathering or processing any sensitive or personal data. According to the broad consensus, the California Consumer Privacy Act will change the way businesses think about user data.
HIPAA is a legal act that establishes the rules for patient information protection. It makes it possible for healthcare patients to control their sensitive information and rely on organizations, which are required to implement standardized patient privacy and security structures.
The California Consumer Privacy Act is effective on January 1st, 2020. This means that, in a little less than two months, California will be the first state to introduce a clear-cut and precisely defined privacy law. Intended to enhance privacy rights and consumer protection for the residents of the state of California, the CCPA takes a broad view of what constitutes private data.
Phishing means deceitful use of electronic communication services to defraud online users. Phishing emails are created with one sinister purpose in mind – to deceive the user and get a hold of his sensitive and valuable information such as credit card data, social security number, passwords, and other private details.