The unpleasant genius of phishing attacks is that almost anything is phishable. Most phishing attacks are an attempt to steal a user’s credentials – a username and password – which, as everyone in cybersecurity knows, is relatively easy to do. But can MFA be phished? For years now, we’ve known that the only protection against … Continued
UserLock: A Duo MFA Alternative
The importance of implementing multi-factor authentication (MFA) is hard to overstate. With tens of thousands of cyber attacks occurring every day and ever-more sophisticated attack methods, most organizations now recognize that protecting access requires more than a password. Having two or more factors of authentication in place is the new standard. And the data backs … Continued
Exploring the evolving landscape of cybersecurity patents and innovations
Today, innovation within cybersecurity is critical. The rise in remote working and cloud computing, among other factors, continues to expose vulnerabilities that cyber attackers are quick to exploit. As cyber threats become more sophisticated, cybersecurity prevention measures must evolve as well. Cybersecurity Ventures expects global cybercrime costs to grow by 15% per year, reaching $10.5 trillion … Continued
How Can Granular MFA Help Balance Security and Productivity?
In less than a decade, how organizations apply multi-factor authentication (MFA) with Active Directory has rapidly evolved. What was once a specialized security technology to secure privileged accounts is now a best practice to secure all user and service accounts. The problem is, most MFA solutions weren’t designed with implementation across all users in mind. … Continued
Stay Safe but Stay in Business
COVID-19, 5 letters and 2 numbers that have turned everyday life upside down for millions of people and organizations across the globe. In an effort to slow the propagation of the virus, governments of several countries have put in place drastic measures of confinement that carry heavy consequences. Not only consequences on everyday life but … Continued
How Strong is Your SMB Security Strategy?
SMBs today are under attack from malware, ransomware, external threats and data breaches. But, with the lack of sophistication around most SMBs security stances, the prospect of remaining unaffected by attacks is bleak. So, SMB’s and MSPs servicing them need a security strategy with maximum impact, but with a minimal investment in time and budget. … Continued
Get Employee Logon Data through Webhooks
With the launch of UserLock 9.6, organizations can now add the value of domain logon management to existing IT systems through an innovative use of webhooks. Webhooks — also known as ‘web callbacks’ or ‘HTTP push APIs’ — are a growing trend in the IT world that enable one app to provide information to other … Continued
Are You Just Waiting for a Compromise?
The modern IT organization is well aware that compromises (in the form of both external attacks and insider threats) are more an issue of when than if. You’ve put up some defensive security solutions – AV, endpoint protection, email scanning, etc. – all in an effort to minimize the threat potential. But, beyond that, what … Continued
Software for fighting internal and external network threats
If you missed us at InfoSecurity London, and with over 300 exhibitors and over 13,000 visitors that is perhaps possible…. here’s your chance for you to get to know us. The following is a short interview from Global Security Magazine. Can you introduce to us your business IS Decisions is a global IT security vendor that … Continued
Panama Papers Leak: Prevention is Always Better than Cure
For almost four decades, Panama’s Mossack Fonseca law firm has specialised in commercial law, trust service and investor advisory, and was known for its discretion to global elites. However, its recent leak of more than 11 million documents – the biggest data leak in history – only reiterates that law firms can never be too … Continued