Imagine one day you go into work only to discover that there has been a data breach. What do you do? If you work in the security team, you will be focused on finding out how it happened, understanding the extent of the damage, preventing if from getting worse and taking measures to stop it..
We live in a world where security and secrecy are inextricably linked. The safeguarding of data and systems relies on the premise that those who are authorised to access them are in possession of something only they know. They then recall and share this secret every time they want to gain access. The problem with..
Authlogics, a specialist in multi-factor authentication, today announced that its Desktop Login Agent is now available for Windows 10. The software application adds 1.5 or 2 factor authentication (2FA), strengthening the login process and ensuring only the person authorised can gain access to their Windows desktop. When using the Desktop Login Agent as a 1.5..
Providing staff with the convenience of remote access is an everyday essential when it comes to boosting productivity, but all of these benefits can easily be wiped out if it compromises the security of your organisations systems and data. In his latest blog, the cyber-security expert, Graham Cluley, reveals that one of the most popular..
During recent conversations with senior IT professionals working within NHS Trusts a similar theme keeps recurring. They know that they have done the right thing by investing in two-factor authentication (2FA) to provide the necessary protection that their IT infrastructure needs, but now they feel like they are being punished for that decision, as the..