Workplace Tips
Workplace security best practices and recent news
Do Biometric Technologies Eliminate the Need for Passwords?
Find out if Face ID and Touch ID will make the world move beyond the password. Face ID. Fingerprint biometrics. Access to a device through detection of typical user patterns. Science fiction has taught entire generations of tech entrepreneurs that the future will be password-free. Many security professionals are happy to call every new authentication […]
Protect Your Data When a Third-Party Website Gets Hacked
Learn how to quarantine compromised data when a trusted partner is attacked. When a high-profile data breach occurs, people aren’t necessarily worried about the company that suffered the breach. Instead, they’re concern is for the end-users of that company’s systems. Those users,customers and employees,are the ones whose sensitive data is at risk. A data breach […]
Security Conferences Provide Great Benefits for Business Leaders
Decision-makers need to be up-to-date on the latest cybersecurity risks. Trade shows are an important part of almost every industry. These events provide crucial networking support for smaller businesses while exposing exhibitors to potential customers. Most executives and small-to-midsize business (SMB) leaders attend their industry’s conferences and trade shows to identify the most pressing developments […]
As Elections Near, Trouble Brews for SMB Security
Many SMB executives feel they are prime targets for foreign attackers who wish to wage cyber war and breach national security. In the current climate, cybersecurity attacks are considerable stressors and remain at the forefront of everyone’s mind. When looking at the small- and midsize-business (SMB) world, in particular, there’s always a concern about keeping […]
Think Beyond IT When Assessing Cybersecurity Risks
Hackers don’t limit themselves to technical exploits—and neither should you. Despite the implications of its name, cybersecurity is more than just an IT issue. Some hackers are infamous for using technical wizardry to find and exploit vulnerabilities in business systems, but the vast majority use far more modest methods. Why go through the trouble of […]
Can You Trust Your Web Browser With Your Passwords?
Learn about the advantages and drawbacks of letting your browser store your passwords. Google Chrome, Firefox, and Safari allow users to store their passwords using a built-in password manager. Some browsers will even generate random passwords for users and remember them on their own. This is undoubtedly a useful feature created to meet popular demand. […]
Password Management in the Age of Data Privacy
Service providers have to be careful about how they capture user data. The internet will not be secure until every user enjoys guaranteed data privacy. Until this is in place, cybercriminals will continue to outpace their victims. Data privacy laws like Europe’s General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA) are […]
Don’t Fall Victim to Password Mistakes in the Office
Employees often have these five misconceptions when choosing passwords for work. Strong password creation is a necessity in the workplace, yet a vast number of working individuals do not understand what exactly is required to generate a secure password. This is problematic because passwords are the first and last line of defense against unauthorized access. […]
Ensure Password Security for Remote Workers
Balance connectivity and security in your password management policy. How many of your employees share passwords with one another? At first, you might want to say that none of them do. It’s specifically forbidden in your cybersecurity policy, after all. But there’s a big difference between saying something and doing it. According to SurveyMonkey, one-third […]
Password Manager Storage: Cloud vs. Local
Discover the pros and cons of each storage medium for security application. Most people would assume that if you want to keep something safe, you have to keep it nearby. This convention of common sense might not tell the entire story, however. Proximity does not necessarily equal security, as anyone who has accidentally left their […]
The Importance of End-User Experience in Selecting Password Management Tools
IT leaders need to prioritize the end-user experience when it comes to security software. It’s a well-known fact that an organization’s security chain is only as strong as its weakest link. The professional cybercriminals responsible for costly, reputation-damaging data breaches know what to look for when scouting new attack opportunities. The common-sense strategy of striking […]
Sharing Passwords Through Slack Is Risky
Make sure your employees know how to identify a secure channel for password sharing. Securely sharing a password is no easy task. Organizations that enforce strict password policies will often have IT professionals generate random passwords for their employees. This is a good move for password security, but it presents a difficult problem. Once you […]