Tag: two-factor authentication

Two factor authentication is widely recommended as a security practice to give an extra layer of protection to your network and personal accounts, but according to security researchers, if you use SMS texts as your second form of authentication, they could be subject to interception and exploitation. Security researchers demonstrated how easily they were able to manipulate the two-factor set up on a Bitcoin wallet account, simply by intercepting the text message sent over the cellular network. Once they reset …

The White House has a new campaign to raise awareness as part of Cyber Security Awareness Month. One of those campaigns is called “Lock Down Your Login,” which aims to educate users on the security benefits of two-factor authentication for their personal online accounts. According to campaign leaders, two-factor authentication “could have prevented as many as 62 percent of successful data breaches last year.” What is two-factor authentication? Two-factor authentication serves as an extra layer of security beyond the usual …

Hold Security, a firm credited with uncovering significant data breaches – such as the one at Adobe Systems in October 2013 – has uncovered a record-breaking hack of 1.2 billion username and passwords from multiple websites. From the Hold Security website: After more than seven months of research, Hold Security identified a Russian cyber gang which is currently in possession of the largest cache of stolen data. While the gang did not have a name, we dubbed it “CyberVor” (“vor” …

For the upcoming IMN Data Center East Conference, I’ve been invited to speak on the panel called “Staying Ahead of the Curve on Services” about managed services for data center operators. From my experience, two of the highest value managed services a data center operator can provide are backup and managed security services. I wrote about backup services in a previous post, so this one is about considerations for offering security services around cloud computing and colocation. Hosted security as …

Online Tech is liveblogging from Milwaukee at Rock IT Around the Clock! That’s the theme for the HIMSS Midwest Area Chapters Fall Technology Conference November 10-12, where we’re exhibiting our HIPAA hosting solutions at booth #501. Here’s our takeaways from a session on cyber security: Session: Cyber Attacks from Shanghai: Prepared? Speaker: Ali Pabrai Firewalls are our first line of defense! Antivirus control Many vulnerabilities enter the network via employees’ email activities. Authentication control This is a critical area We struggle with …

October is National Cyber Security Awareness Month (NCSAM), celebrated annually to highlight awareness about online security for consumers, small and medium-sized businesses (SMBs), corporations, educational institutions and young people nationwide. NCSAM will focus on different aspects of online security, including mobile devices, cyber education (including workforce development in STEM – Science, Technology, Engineering and Math), cybercrime, and cybersecurity as it affects critical society infrastructure, such as transportation systems, electrical grids, emergency response systems and more. Among the resources on their …

A few major takeaways from Trustwave’s 2013 Global Security Report reveal that the retail industry was at the top of data breach investigations at 45 percent. A total of 96 percent of customer records (payment card data, PII (personally identifiable information) and email addresses) were targeted, while the rest included confidential information, intellectual property, electronic protected health information (ePHI) and business financial account numbers. In 2012, the retail industry saw a 15 percent increase compared to 2011 in data breaches. …

Global spending on information security is expected to total $64.4 billion this year with an average annual growth rate of 8.7 percent over the next four years, according to Lawrence Pingree, research director at Gartner, as reported by USAToday.com. Information security threats have increased in many industries, including the healthcare, financial, ecommerce and many other industries that handle sensitive personal data. Most recently, numerous U.S. media outlets were hit by hackers from Syria, including the NYTimes and Twitter this week, …

The following is a guest blog from Ann Arbor-based Duo Security‘s Security Evangelist, Mark Stanislav: A recent article from Forbes titled, “Is Your Investment In Security Really Worth It?”, called into question whether or not the money spent for information security was having impactful returns for the investments being made. Kindly enough, the author reached out to various information security vendors for their rebuttals to this unflattering portrayal of security vendors as taking more than they were contributing back to their …

While you may think your organization has all of the appropriate technical, physical and administrative security in place to guard against a data breach, what about your third-party vendors and additional web-based software that you use on your website or internally to support your company’s workflow processes? This question is one raised after the recent hack by external forces in Syria that took down CNN, Time and the Washington Post on Thursday. Instead of directly targeting their websites, hackers had …

Get started now. Exceptional service awaits.

Live Chat