Best Practices in Authentication Still Mostly Ignored By Businesses

Best Practices in Authentication Still Mostly Ignored By Businesses

Best Practices in Authentication Still Mostly Ignored By Businesses How do cybercriminals breach into corporate systems?  They use many tactics but on of the easiest is through the use of compromised credentials.  The problems is that these are real valid credentials...
Job Dissatisfaction is prominent among IT Security Professionals

Job Dissatisfaction is prominent among IT Security Professionals

Job Dissatisfaction is prominent among IT Security Professionals   Many Cybersecurity professionals love a challenge.  They do not enjoy the doldrums of make work security.  They long for excitement and challenging work. They are in demand so it is not suprising...
Cyberbreaches cause Small Businesses to Close

Cyberbreaches cause Small Businesses to Close

Cyberbreaches cause Small Businesses to Close   Cybercriminals have found a lucrative new target – the small business.  Unfortunately, for a tenth of them the breach meant closing their doors forever. The impacts on small businesses is excentuated greatly....
Chinese Using Visas to Import Corporate Spies and Thieves

Chinese Using Visas to Import Corporate Spies and Thieves

Chinese Using Visas to Import Corporate Spys and Thieves It is about time that some of these Nation-State cyber hackers are going to prison for stealing intellectual property from our US Companies and government contractors.  If you are not aware the Chinese...
It is People and Shortcuts Not MFA that’s the Issue and Biometrics is not the Answer

It is People and Shortcuts Not MFA that’s the Issue and Biometrics is not the Answer

It is People and Shortcuts Not MFA that’s the Issue and Biometrics is not the Answer   There is a risk to Multi-factor authentication — but it why? Most businesses who choose to use it — decide to use the most insecure version of it. Hackers already...
Malcare WordPress Security