The future of passwords is under the spotlight at present. The discussion to remove and replace them with alternative authentication methods is being addressed in many virtual boardrooms around the world with the need to migrate towards passwordless authentication. As password-related breaches become more common (SolarWinds and Cit0Day) and bigger (COMB), it is becoming more..
No-one could have predicted how 2020 was going to pan out when we welcomed the new year in all those months ago before lockdowns and remote working were part of our daily setup for this year. Many industries have struggled throughout but the technology sector and in particular cybersecurity have never been so busy (well..
Definition of Strong: “powerful and difficult to resist or defeat” Definition of Secure: “certain to remain safe and unthreatened” With October being the National CyberSecurity Awareness month, there are many IT Security recommendations on how to stay safe online, to protect what you connect, and to lock down your login. One of the key..
Are you aware of the implications that a ‘phishing attack’ can cause you as an individual as well as your business? Phishing attacks are one of the most common and prevalent attacks that both individuals and companies can suffer from with it leading to identity and password theft. Dating back to the 1990s, phishing attacks..
Data Protection Day, also known as Data Privacy Day in the US, is an annual, internationally recognised day created to raise awareness about data security, and promote privacy and data protection — an issue which has become particularly pressing in recent years, thanks to all of the mainstream media attention on the myriad data breaches..
Passwords are not secure. We speak about this “ad nauseam” working with clients daily to discuss what the issues really are and the real-life impacts that weak password solutions can have on a business. A total takeover, non-adherence to compliance, loss of IP, finances & reputation and putting all of your users and staff at..
Most major organisations working with Microsoft systems will use Active Directory (AD) to centrally authenticate all resources on a network based on a central database. The solution, in theory, is a way to centrally manage user security, which sounds appealing to large organisations. The reality, however, is that AD is not secure on its own..
July 2019 marked the passing of respected computer pioneer, Fernando Corbato, aged 93, who had a long and illustrious career in technology leaving many great legacies to the field of technology, including 50 years of passwords. Inventor of the password Dr Corbato is perhaps most famous for inventing the password. But this invention was actually..
Authlogics wins Best Password Compliance & Replacement Specialists from AI Cyber Security Awards 2019
Authlogics has been presented with an award for Best Password Compliance & Replacement Specialists from the AI Cyber Security Awards 2019, acknowledging the innovation of its Password Policy Agent and Authentication Suite. Private and public sector organisations around the world are benefiting from Authlogics solutions, to ensure online accounts are operated with compliant passwords that..
The enterprise IT environment of today couldn’t be more different from that of a decade ago. From cloud computing and AI to automation and VR, a host of advanced technologies are changing the way we work and network. And it’s not just enterprises that are getting more sophisticated: so too are cybercriminals. Instances of cybercrime..