Over the weekend it was widely reported that the approx. 90 email accounts in the UK Parliament had been compromised, in a brute force attack that looked to exploit accounts ‘protected’ by weak passwords, an example of which might be Westminster123 or JohnSmithMP! According to reports, these 90 accounts represent less than 1% of the..
Just as complete strangers will not think twice about discussing their embarrassing ailments as soon as they discover someone is a doctor, the same can be said of IT security professionals. Was an email a scam? Should I have clicked on that link? Is online banking safe? What antivirus do you recommend? The list is..
So, you made the wise decision to look at options to replace passwords in your organisation. Good idea! You may have also thought that the Infosec show in London last week would be the obvious place to do some homework, but was it? I have attended the UK’s premier information security expo for many years..
In recent videos we have explained the different elements of multi-factor authentication, from 1.5 Factor Authentication, through to 2FA and 3FA. But, how do you decide the number of factors to use in order to deliver the appropriate level of security? In this new video blog Authlogics gives you the answer. You need to be thinking about risk..
Last week I posted a video explaining Authlogics approach to 1.5FA. This week, I want to talk about 3FA which is an extension of 2FA (something you have and something you know) by the addition of something you are doing that is specific to a task, typically known in the industry as transaction signing.
Way back in December 2012, I met with a journalist in London to introduce the concept of 1.5FA. Roll forward four years and I find myself still having similar conversations. Organisations are desperately looking for a more flexible approach to how they deploy authentication. There are instances where 2FA and 3FA are a requirement (it may be..
In recent months there has been a lot of stories in the media, about some very sophisticated technologies that contact centers are deploying to help them identify and authenticate customers, quicker and with more accuracy. However, one increasingly problematic issue that is being overlooked is the requirement for agents making outbound calls to be able..
I am used to reading articles calling for passwords to be replaced, in fact I have written a number of them myself. However, I was shocked to read the headline on DARKreading “Multi-factor IT Authentication Hampers Progress, Says 47% US Companies”. However, should I have been surprised? Maybe yes and maybe no. The story was..
Early on Monday morning, I was dashing to catch a train in to London. In order to get the best priced fare my Office Manager had diligently booked my ticket in advance. With just ten minutes to spare I arrived at the station, coffee and croissant in hand. I found my way to the advance ticket..
You have no doubt read or heard about the new EU General Data Protection Regulation, otherwise known as GDPR. Put simply it is a new law that was approved by the European Parliament on 14th April 2016 and supersedes the current EU Data Protection Directive. Here is what you need to know … This new..