Understanding the basics of two-factor authentication
Two-factor authentication (2FA) is the least complex version of multi-factor authorization (MFA) and was invented to add an extra layer of security to the – now considered old-fashioned and insecure –...
View ArticleApple iOS 13 will better protect user privacy, but more could be done
Last week, Apple introduced several new privacy features to its latest mobile operating system, iOS 13. The Internet, predictably, expressed doubt, questioning Apple’s oversized influence, its...
View Article5 simple steps to securing your remote employees
As remote working has become standard practice, employees are working from anywhere and using any device they can to get the job done. That means repeated connections to unsecured public Wi-Fi...
View ArticleWhy all organizations must better protect sensitive data
About two weeks ago, National Cybersecurity Awareness Month (NCSAM) kicked off with a new message stressing personal responsibility for users keeping themselves safe online: “Own IT. Secure IT....
View ArticleHarnessing the power of identity management (IDaaS) in the cloud
Sometimes, consumers have it easy. Take, for example, when they accidentally lock themselves out of their personal email. Their solution? Reset the password. With one click, they’re able to change...
View Article
More Pages to Explore .....