multi-factor authentication

6 Password Policy Management Best Practices for a more secure IT environment

Remote working has impacted the world of cybersecurity in multiple ways. Remote workers are often not protected by enterprise-level security…

3 years ago

Myths about Multi-factor Authentication

When large organizations like LinkedIn, Twitter and Facebook report password hacks, it throws some light on how vulnerable current systems…

5 years ago

The Key to Data Security: WebAuthn

What is WebAuthn? WebAuthn (Web Authentication API) is a global standard specification for secure authentication on the Web, formulated in…

5 years ago

To Implement or Ignore: MFA for Custom Apps & Websites

Multi-factor authentication (MFA) is one of the most highly recommended security measures in this age of brute-force attacks, data breaches…

5 years ago

The Problem with SMS-based Authentication

As mobile phones became more sophisticated, their usage shifted from being communication oriented to application oriented. But phone numbers were…

5 years ago

Hashing And Salting – The What And How

“irgvctxmsr” - sounds like gibberish, doesn’t it? But if you were to decrypt this string using a mono-alphabet shift cipher…

5 years ago

3 Important steps to improve network security against brute-force attacks

A brute-force attack is a type of cybercrime which involves automated hacking activity using bots. The primary aim of a…

5 years ago

Protect your Business from Privilege Abuse with IAM

Privilege abuse - that is the security threat that your business’s IT team is most worried about. According to a…

5 years ago

Why is multi-factor authentication indispensable?

Ever heard of the butterfly theory? A single flap of a butterfly’s wings in Australia has the potential to cause…

5 years ago

The What, Why and How of Two-factor Authentication (2FA): Decoded

Whether or not you know what it is called, you have likely used 2FA at least once in your life…

5 years ago