Author Archives: François Amigorena

Comments Off on Can MFA Be Phished? How to Avoid Getting Scammed

Can MFA Be Phished? How to Avoid Getting Scammed

Can MFA Be Phished? How to Avoid Getting Scammed

The unpleasant genius of phishing attacks is that almost anything is phishable. Most phishing attacks are an attempt to steal a user’s credentials – a username and password – which, as everyone in cybersecurity knows, is relatively easy to do. But can MFA be phished? For years now, we’ve known that the only protection against … Continued

Comments Off on UserLock: A Duo MFA Alternative

UserLock: A Duo MFA Alternative

UserLock: A Duo MFA Alternative

The importance of implementing multi-factor authentication (MFA) is hard to overstate. With tens of thousands of cyber attacks occurring every day and ever-more sophisticated attack methods, most organizations now recognize that protecting access requires more than a password. Having two or more factors of authentication in place is the new standard. And the data backs … Continued

Comments Off on Exploring the evolving landscape of cybersecurity patents and innovations

Exploring the evolving landscape of cybersecurity patents and innovations

Exploring the evolving landscape of cybersecurity patents and innovations

Today, innovation within cybersecurity is critical. The rise in remote working and cloud computing, among other factors, continues to expose vulnerabilities that cyber attackers are quick to exploit. As cyber threats become more sophisticated, cybersecurity prevention measures must evolve as well. Cybersecurity Ventures expects global cybercrime costs to grow by 15% per year, reaching $10.5 trillion … Continued

Comments Off on How Can Granular MFA Help Balance Security and Productivity?

How Can Granular MFA Help Balance Security and Productivity?

How Can Granular MFA Help Balance Security and Productivity?

In less than a decade, how organizations apply multi-factor authentication (MFA) with Active Directory has rapidly evolved. What was once a specialized security technology to secure privileged accounts is now a best practice to secure all user and service accounts. The problem is, most MFA solutions weren’t designed with implementation across all users in mind. … Continued

Comments Off on Stay Safe but Stay in Business

Stay Safe but Stay in Business

Stay Safe but Stay in Business

COVID-19, 5 letters and 2 numbers that have turned everyday life upside down for millions of people and organizations across the globe. In an effort to slow the propagation of the virus, governments of several countries have put in place drastic measures of confinement that carry heavy consequences. Not only consequences on everyday life but … Continued

Comments Off on How Strong is Your SMB Security Strategy?

How Strong is Your SMB Security Strategy?

How Strong is Your SMB Security Strategy?

SMBs today are under attack from malware, ransomware, external threats and data breaches. But, with the lack of sophistication around most SMBs security stances, the prospect of remaining unaffected by attacks is bleak. So, SMB’s and MSPs servicing them need a security strategy with maximum impact, but with a minimal investment in time and budget. … Continued

Comments Off on Get Employee Logon Data through Webhooks

Get Employee Logon Data through Webhooks

Get Employee Logon Data through Webhooks

With the launch of UserLock 9.6, organizations can now add the value of domain logon management to existing IT systems through an innovative use of webhooks. Webhooks — also known as ‘web callbacks’ or ‘HTTP push APIs’ — are a growing trend in the IT world that enable one app to provide information to other … Continued

Comments Off on Are You Just Waiting for a Compromise?

Are You Just Waiting for a Compromise?

Are You Just Waiting for a Compromise?

The modern IT organization is well aware that compromises (in the form of both external attacks and insider threats) are more an issue of when than if. You’ve put up some defensive security solutions – AV, endpoint protection, email scanning, etc. – all in an effort to minimize the threat potential. But, beyond that, what … Continued

Comments Off on Software for fighting internal and external network threats

Software for fighting internal and external network threats

Software for fighting internal and external network threats

If you missed us at InfoSecurity London, and with over 300 exhibitors and over 13,000 visitors that is perhaps possible…. here’s your chance for you to get to know us. The following is a short interview from Global Security Magazine. Can you introduce to us your business IS Decisions is a global IT security vendor that … Continued

, Comments Off on Panama Papers Leak: Prevention is Always Better than Cure

Panama Papers Leak: Prevention is Always Better than Cure

Panama Papers Leak: Prevention is Always Better than Cure

For almost four decades, Panama’s Mossack Fonseca law firm has specialised in commercial law, trust service and investor advisory, and was known for its discretion to global elites. However, its recent leak of more than 11 million documents – the biggest data leak in history – only reiterates that law firms can never be too … Continued

Secured By miniOrange