Multi-Factor Authentication

Your end users already carry multiple devices. Why not put them to use? That’s the thought behind multi-factor authentication (MFA), a solution leveraging multiple devices and factors to provide extra security: texting an authentication code to a user’s smartphone, for instance. Here’s what Okta has to say about this innovative authentication method.

6 Steps to Practice Strong Laptop Security

If you’ve ever found yourself searching security questions like “how to secure my work computer” and “laptop security antivirus,” this article is for you. Here, we answer common company laptop security questions like: How do I keep my laptop secure in a public network? What is the best security system for my computer? Is my laptop password safe?…

Byte-Sized Video: Don’t Limit the Scope of Your SSO and MFA

No matter how much you may love your users, you can’t trust all of them. With so many individuals and devices accessing your apps, and requests coming from various networks, there’s a real risk of bad actors slipping through the cracks. Single-sign on (SSO) and multi-factor authentication (MFA) are must-haves when it comes to modern security. To…

What Is Biometric Authentication?

Biometric authentication is a security process that compares a person’s characteristics to a stored set of biometric data in order to grant access to buildings, applications, systems, and more. With cybercrime, fraud, and identity theft on the rise, it’s more important than ever for businesses to help customers and employees verify their identity,…

What Is Data Misuse?

Data misuse is the use of information in ways it wasn’t intended for. User agreements, corporate policies, data privacy laws, and industry regulations all set conditions for how data can be collected and used. Data misuse violates these requirements. Unlike data theft, data misuse doesn’t necessarily happen as a result of a cyberattack or when…

What Is Data Security?

Data security is the protection of digital data and accounts in accordance with laws and industry standards in order to mitigate risks and repel attackers. It encompasses business data, employee information, and customer and user data. If that sounds multifaceted, it is: putting data security into practice isn’t one size fits all. With companies…

Stories from the Trenches: Scale & Growth in the Cloud

Rubrik burst onto the scene in 2014 as a leading provider of cloud-based data management and protection solutions. The Church of Jesus Christ of Latter-day Saints was founded in 1830, and over its long history has become a nexus of philanthropy and faith. At first glance, these two organizations have little in common—but there’s more to this odd…

How Thoughtworks Gained Better Security and Increased Productivity—by Losing Their Dependence on AD

Thoughtworks began its journey away from Active Directory (AD) less than three years ago, though Philip Ibarrola, Thoughtworks TechOps Head of Technology, says it was a long time coming. Thoughtworks was once a Microsoft-only shop: Microsoft servers, Windows-based laptops, and security and authentications, all managed by AD. But since 2011, the…

3 Data Breach Myths Debunked

As the ever-shifting security and threat landscape continues to evolve, it can be tough to distinguish security fact from fiction. Some common data breach misconceptions can seriously misinform your organization’s security strategy. In this post, we’ll touch on three of the most common data breach myths, and share some information on why they don…

How to Boost User Retention with Risk-Based Authentication

Today consumer-facing service providers have a stark choice—to offer robust security or an easy user experience. But for many organizations, missing the mark on either of these elements can seriously damage their user engagement and retention rates—and by extension, their bottom line. To address this, we have now made Risk-Based Authentication…

Archive