Top 5 Global Cyber Security Trends of 2023, According to Google Report

Top 5 Global Cyber Security Trends of 2023, According to Google Report

It is taking less time for organisations to detect attackers in their environment, a report by Mandiant Consulting, a part of Google Cloud, has found. This suggests that companies are strengthening their security posture. The M-Trends 2024 report also highlighted that the top targeted industries of 2023 were financial services, business and professional services, tech, retail and hospitality, healthcare and government. This aligns with the fact that 52% of attackers were primarily motivated by financial…

Read More

Defusing the threat of compromised credentials

Defusing the threat of compromised credentials

Let’s say that, during the middle of a busy day, you receive what looks like a work-related email with a QR code. The email claims to come from a coworker, requesting your help in reviewing a document.  You scan the QR code with your phone and it takes you to what looks like a Microsoft 365 sign-in page. You enter your credentials; however, nothing seems to load.   Not thinking much of it, and being a…

Read More

Top 6 Passwordless Authentication Solutions for 2024

Top 6 Passwordless Authentication Solutions for 2024

Best for remote and hybrid workforces: Keeper Best passwordless authentication solution for developers: Okta Best for Microsoft Azure cloud environments: Microsoft Entra ID Best passwordless authentication for SMBs: Cisco Duo Best IAM solution for enterprises: Ping Identity Best hardware solution for passwordless authentication: Yubico Passwordless authentication allows users to login to devices and applications without entering a password. Common passwordless authentication methods include FIDO2 biometrics like fingerprints and facial recognition, smart cards and mobile apps…

Read More

6 Best Authenticator Apps for 2024

6 Best Authenticator Apps for 2024

Authenticator apps are increasing in adoption as they add another layer of security to user identity verification. A study found 90% of organizations reported identity-related breaches last year, and authenticator apps are designed to help reduce this number. Authenticator apps help individuals and organizations double-check user identity by using two-factor or multi-factor authentication to verify and authenticate user identities before granting access to them. In this article, we will review the best authenticator apps in…

Read More

6 Best Multi-Factor Authentication (MFA) Solutions for 2024

6 Best Multi-Factor Authentication (MFA) Solutions for 2024

Best free MFA app for individuals: Google Authenticator Best MFA software for small to medium-sized businesses: Cisco Duo Best MFA solution for developers in startups and nonprofits: Auth0 Best MFA software for enterprises: PingID Best MFA solution for developers building self-hosted applications: FusionAuth Best for building a customized workforce IAM solution: Okta Multi-factor authentication requires users to present two or more pieces of evidence to prove their identity, such as a password and a one-time…

Read More

MFA vs 2FA: Which Is Best for Your Business?

MFA vs 2FA: Which Is Best for Your Business?

Breaches are more common than ever, phishing scams continue to have success and AI is helping to take cybercrime to a whole new level. Hornetsecurity’s Cyber Security Report 2024 analyzed 45 billion emails sent in 2023 — 3.6% were considered malicious. That’s 1.6 billion potentially harmful emails. Almost half of all email-based attacks use phishing to obtain the passwords of users. If a user falls for a phishing scam and their credentials are compromised, multi-factor…

Read More

5 Benefits of Passwordless Authentication

5 Benefits of Passwordless Authentication

Passwordless technology is gaining traction due to the dizzying number of passwords that the average user accumulates. When you tally up email, phone, banking, travel, rideshare, hospitality, browsers and the fact that just about every service wants you to download their app and enter a password, it is no wonder that most users repeat the same passwords or adjust them only slightly (making it easy for hackers to crack them). Passwordless authentication is a way…

Read More

Spear Phishing vs Phishing: What Are The Main Differences?

Spear Phishing vs Phishing: What Are The Main Differences?

Threat actors love phishing because it works. It is particularly effective in cloud infrastructure—once they’re inside, they gain access to anything else related to that cloud. According to Hornetsecurity’s Cyber Security Report 2024, there were 1.6 billion potentially harmful emails sent during 2023. Almost half of them used phishing to obtain the passwords of users. This makes it by far the most common attack vector. But not all phishing is the same. Highly targeted phishing…

Read More

Interview: Former FBI Analyst on the CJIS MFA Mandate & Duo

Interview: Former FBI Analyst on the CJIS MFA Mandate & Duo

Recently, the FBI updated their CJIS (Criminal Justice Information Security) policy to require MFA for accessing any application housing CJIS data. Thankfully, we have a former FBI analyst on the Cisco Security team who can break it all down for us. Questions: 1. You’re currently the PMM Leader for Government and Public Sector at Cisco. Before joining Cisco, you spent 25 years supporting the United States Intelligence Community for various agencies. What do you see…

Read More

How to Prevent Phishing Attacks with Multi-Factor Authentication

How to Prevent Phishing Attacks with Multi-Factor Authentication

Phishing takes advantage of the weakest link in any organization’s cybersecurity system—-human behavior. Phishing attacks are generally launched via email, although some opening salvos have begun using text messaging or phone calls. In the most common scenario, an email arrives purporting to be from HR or IT, for example. It looks just like any other company email. It advises the viewer to update their personal information or IT profile by clicking on a link or…

Read More
1 2