With Microsoft’s announcement to discontinue MFA via the Microsoft MFA server and a rebranding to Microsoft Entra ID (formerly Azure AD), many organizations are at a crossroads: embrace the cloud-based Azure AD (now Microsoft Entra ID) MFA or maintain on-premise authentication. This decision isn’t one-size-fits-all. While cloud migration may be the ideal path for some, … Continued
The new FTC MFA requirement: Here’s what auto dealers need to know
After the FTC’s latest update to the Gramm-Leach-Billey Act (GLBA), any organization, including auto dealerships, that processes and stores customers’ personal financial data must meet several compliance requirements as of June 9, 2023. A key part of those requirements: a data security program with identity and access management support, including MFA. The new FTC MFA … Continued
How MFA prevents man-in-the-middle (MiTM) phishing attacks
For cybercriminals, the appeal of phishing is simple: it’s reliable. At no cost, attackers can target as many employees as they want to gain access to a user account. It’s a numbers game, and they need only fool a single user. When that happens – and the overwhelming evidence is that it will – attackers … Continued
Two-factor authentication in schools: The essential guide
Like any other sector, education heavily relies on digital infrastructure, making it a hot spot for malicious activities. Check Point’s 2022 Mid-Year Report reinforces the urgency to secure educational institutions, highlighting a crazy 44% surge in cyber-attacks specifically aimed at the education sector compared to 2021. On average, organizations in this sector suffered 2297 attacks … Continued
A guide to the (revised) FTC Safeguards Rule’s new FTC MFA requirement
According to the FTC’s latest update to the Gramm-Leach-Billey Act (GLBA), many organizations now face new compliance requirements, including the FTC MFA requirement. In an effort to protect sensitive consumer data and curtail rampant data compromises, the FTC recently revised the requirements detailed in the Safeguards Rule, a subset of GLBA. Under these new guidelines, … Continued
Why 2FA for financial services is (still) so important
The large-scale cyber attack on JP Morgan Chase in 2014 exposed the vulnerability of financial institutions’ digital infrastructure. As a result of the historic attack, hackers gained access to the personal information of 76 million households and 7 million small businesses. The blow to the bank’s reputation was significant, and swift. Beyond the immediate financial … Continued
Best 2FA authenticator apps with push notifications of 2023
Between remote work and evolving cyber threats, an additional layer of security beyond the password is not a “nice to have.” One of the most effective methods to safeguard your user accounts is two-factor authentication (2FA). 2FA requires users to provide two distinct forms of identification to verify they are, in fact, who they claim … Continued
Why UserLock? Compare UserLock alternatives
UserLock is an access management and multi-factor authentication (MFA) solution created by IS Decisions. It offers IT teams enhanced protection, control, and visibility over user access in Windows Active Directory and cloud environments. UserLock provides a solution for key zero-trust concerns such as unauthorized access and data breaches. Easy to install, it integrates seamlessly with … Continued
A guide to MFA prompt frequency: How often should you require MFA?
Every year, cybercriminals have more opportunities to exploit vulnerable user accounts and gain unauthorized access to corporate networks. Stolen or compromised credentials pose one of the largest financial threats to organizations, at around $4.5m per data breach. Compromised login credentials are the most common initial attack vector. To protect key assets, organizations can (and should) … Continued
How to evaluate common multi-factor authentication (MFA) methods
MFA is an organization’s best defense against the increasing cost of data breaches. The question for savvy IT pros is not if to apply MFA, but how? A key part of how you apply MFA is the method you choose for your team. There are plenty of options out there, but your choice will likely … Continued