icon

Hideez Blog | Identity Management News, Best practices & Tips

What is a Hardware Token? Hard Tokens vs. Soft Tokens

Hardware tokens Explained by Hideez
Passwords are flawed, and nowadays, obsolete methods of authentication. For this reason, cybersecurity companies have developed more sophisticated authentication methods for ensuring enhanced user security. The most notable examples are hardware tokens, dedicated portable devices that authenticate the user’s identity and prevent unauthorized access.

CPRA explained. What does it mean for Businesses?

<b>CPRA explained. What does it mean for Businesses?</b>
The CCPA, California Consumer Privacy Act, has been legally enforceable since July 1st of last year. It is the first significant privacy law in the US pertaining to consumer control of personal data. And, even though it hasn’t even been a year since the official legal enforcement of the CCPA started, Californians have already voted for the follow-up act, called the California Privacy Rights Act (CPRA).

[Webinar] Revolution in authentication Fast Identity Online. Technology that will change the world

Webinar on passwordless authentication and its implementation in the business environment. Discussion topics:🔺Will the FIDO standard replace passwords? 🔺The magic of FIDO passwordless authentication. 🔺 Case studies of Fast Identity🔺Questions and answers

Wireless Electronic Signature “Almaz-1K”: convenience and safety in your pocket

Wireless Electronic Signature “Almaz-1K”: convenience and safety in your pocket
Hideez Group, together with the Institute of Information Technologies JSC, presented a new tool for secure data storage - the Almaz-1K electronic key, which supports Bluetooth wireless technology.

Save Time To Save Lives. Security Tools for Healthcare in the Time of Crisis

Save Time To Save Lives. Security Tools for Healthcare in the Time of Crisis
Doctors and nurses are leading the fight for human lives amidst the coronavirus outbreak. Once again, they rise to the challenge, providing help for those in need, and giving hope to others. What they need right now is time. Time to treat current patients and time to get ready for the new ones.

Secure Remote Work during a Pandemic. Best Authentication Tips

Secure Remote Work during a Pandemic. Best Authentication Tips
There’s a dramatic increase in phishing and other breach attempts as cybercriminals are increasingly seeking to profit off the coronavirus panic. How do you protect your organization from such attacks? Read more:

NYDFS Cybersecurity Regulation & NYDFS Compliance

NYDFS Cybersecurity Regulation & NYDFS Compliance

The NYDFS Cybersecurity Regulation is a set of regulations from the New York Department of Financial Services. This legislation places cybersecurity requirements on all financial institutions that operate in New York. It stipulates that all DFS-regulated companies should have cybersecurity plans, policies, and maintain detailed reporting systems for cybersecurity events.

Forget Your Password. Ultimate Guide to Passwordless Future

Forget Your Password. Ultimate Guide to Passwordless Future
People have an ancient-long history of using passwords. Let's recap the development of passwords and authentication technologies (2FA, MFA, OTP, U2F, FIDO2). Get the Manual on how to become passwordless in 2020.

Multi-factor Authentication: Why is a Separate Wearable Device Better Than Your Smartphone?

Multi-factor Authentication: Why is a Separate Wearable Device Better Than Your Smartphone?
In the United States, about 19% of the adult population has experienced identity theft. Over 60 million Americans have had their online identity exposed by hacks of the customer databases of their service providers or government agencies. The situation is similar in Europe and other countries.

Passwordless authentication: Reality for 2020?

Passwordless authentication: Reality for 2020?
Passwords suffer a major reputational crisis. Once considered safe and secure, they are now deemed the weak spot in every system. With passwordless authentication, there is no need to use passwords, which could practically eliminate the chances of suffering a security breach. 

Cybersecurity Best Practices for Employees

Cybersecurity Best Practices for Employees
Staff members can fall victim to many different security threats, companies can never be secure enough when it comes to safeguarding their sensitive information. Continue reading to find out the best practices for employees and how to implement them to improve employee cybersecurity awareness going into 2020. 

What is Zero Trust Security? Successful Zero Trust Implementation

What is Zero Trust Security? Successful Zero Trust Implementation
Zero Trust architecture has experienced a meteoric rise over the past couple of years, and it became a go-to choice for many organizations looking for a reliable security system. Despite popularity among big and small companies, Zero Trust model remains relatively unknown among average Internet users.