Are you aware of the implications that a ‘phishing attack’ can cause you as an individual as well as your business? Phishing attacks are one of the most common and prevalent attacks that both individuals and companies can suffer from with it leading to identity and password theft. Dating back to the 1990s, phishing attacks..
Authlogics are celebrating for the second year running being awarded “Best Password Compliance Specialist 2020” at the AI CyberSecurity Awards. Authlogics provides customers with unique solutions that help them transition from weak and vulnerable passwords to always compliant and unique ones. Our Password Security Management (PSM) and Multi-Factor Authentication (MFA) suite provides a comprehensive suite..
With the world experiencing a pandemic, companies and organisations have been forced into a situation whereby staff are being expected, where they can, to work remotely. The acceleration of this motion has not given IT security management the opportunity to be best prepared for this. As we sit at home and log on to our..
We are starting the new year with a new release of our Authentication Server Suite. This release focuses on four main areas to add value to customers: user self-service, hardware tokens, choosing passwords and auditing. Updates to Password Policy Agent and Windows Desktop Logon Agent are also included to round off this release. Brand new..
Earlier this week the Daily Mail published a story with the headline ‘How to create a password that will take a hacker 227 MILLION years to crack – and the UK’s top 10 can be deciphered in less than a second’. The list of vulnerable passwords offers no surprises, so how do you create an..
There is a roaring trade in paper password notebooks. A quick look on Amazon and you will find passwords journals, passwords keepers, Internet address and password log book and even and I Love My Password! book, amongst many others. Seemingly, these go against everything we are told by security professionals. Passwords are secrets and as..
You may not be familiar with Bill Burr, but chances are he has had an impact on your day today. His guidelines for password security are the reason that in all probability you are adding an exclamation mark to the end of your memorable (or in reality, not so memorable) ‘secret’. The crazy thing is..
A new online advertisement from Barclays demonstrates just how easy it can be for a fraudster to call a customer and get them to divulge their security information. I defy a customer of any bank to watch this video and not think twice the next time they receive a call from someone claiming to be..
So, you made the wise decision to look at options to replace passwords in your organisation. Good idea! You may have also thought that the Infosec show in London last week would be the obvious place to do some homework, but was it? I have attended the UK’s premier information security expo for many years..
In recent months there has been a lot of stories in the media, about some very sophisticated technologies that contact centers are deploying to help them identify and authenticate customers, quicker and with more accuracy. However, one increasingly problematic issue that is being overlooked is the requirement for agents making outbound calls to be able..