No-one could have predicted how 2020 was going to pan out when we welcomed the new year in all those months ago before lockdowns and remote working were part of our daily setup for this year. Many industries have struggled throughout but the technology sector and in particular cybersecurity have never been so busy (well..
Unless you’ve been living under a rock, or aren’t into IT security, you will of heard about the Cit0day breach database dump. Various online news outlets rushed to get their scare tactic reports out, while others took some time to pause and analyze what was found in the breach before commenting. As ever, industry insiders..
Protect yourself, protect your organization, protect your Active Directory With everyone working at home and IT policies under scrutiny as cyberattacks are on the rise, how do you ensure your Active Directory is secure? Time to do an audit to find out! Remote working is key to keeping organizations functional but it can also be..
Definition of Strong: “powerful and difficult to resist or defeat” Definition of Secure: “certain to remain safe and unthreatened” With October being the National CyberSecurity Awareness month, there are many IT Security recommendations on how to stay safe online, to protect what you connect, and to lock down your login. One of the key..
Whether it is POPIA, CMMC, BDDK, GDPR, or NYDFS that you are needing to comply with is dependent upon which country your organization is located in and what international business connections you have. In today’s working environment, organizations are expected to comply, with both international and local regulatory bodies, and those that don’t, face the..
COVID-19 has changed the way we work in 2020 and for the foreseeable future. Working from home is now the new normal and many organizations took advantage of free trials and special offers to secure their workforce as a quick fix at the beginning of the global pandemic. Although, on reflection now, were those deals..
Are you aware of the implications that a ‘phishing attack’ can cause you as an individual as well as your business? Phishing attacks are one of the most common and prevalent attacks that both individuals and companies can suffer from with it leading to identity and password theft. Dating back to the 1990s, phishing attacks..
Authlogics are celebrating for the second year running being awarded “Best Password Compliance Specialist 2020” at the AI CyberSecurity Awards. Authlogics provides customers with unique solutions that help them transition from weak and vulnerable passwords to always compliant and unique ones. Our Password Security Management (PSM) and Multi-Factor Authentication (MFA) suite provides a comprehensive suite..
PRESS RELEASE: Every Organisation Should Act Now to Stop COVID-19 Cyber-Attacks Exploiting Weak Passwords
Authlogics Enables New National Cyber Security Centre Guidance to be Practically Implemented and Sustained BRACKNELL, UK, 11th MAY 2020 – Authlogics, the UK-based identity and access management specialists, has responded to advice from the National Cyber Security Centre (NCSC) for organisations to use better password management, in order to protect themselves against organised COVID-19 cyber-attacks…
With the world experiencing a pandemic, companies and organisations have been forced into a situation whereby staff are being expected, where they can, to work remotely. The acceleration of this motion has not given IT security management the opportunity to be best prepared for this. As we sit at home and log on to our..