Multi-Factor Authentication

Data breaches have become commonplace these days, and enterprises around the world agree that it’s not a matter of “if” but rather “when.” Complicating matters, gone are the days when your employees worked nine to five, from their desktops or laptops, or even within the walls of the office where access is delivered in a…

+ read more

Kent Purdy
Jun 30, 2016
2:09 am
Reads:
2,079
Score:
5

CIO recently reported that a variant of spear phishing called whaling has emerged as a major cybersecurity threat. Whaling is a social-engineering scheme that uses the relationship between executives and employees to trick employees into taking an illicit action. An attacker masquerading as an executive bids, and the employee does his or her bidding. Notable…

+ read more

Travis Greene
May 19, 2016
2:11 pm
Reads:
5,715
Score:
Unrated

As organizations respond to the current sea change in the way people work as well as what they use as their office, most organizations still have a ways to go in terms of keeping remote access secure and effective while at the same time reigning in costs. Although most all companies are continuing their shift…

+ read more

Kent Purdy
Jun 25, 2015
4:37 pm
Reads:
2,283
Score:
Unrated

Since WikiLeaks recently released thousands of hacked documents from Sony Entertainment Pictures, IT security professionals have been scouring the searchable database of 30,287 documents and 173,132 emails. Besides incriminating celebrity gossip, they found poor password practices that would make even your tech-illiterate grandparents cringe. Security analyst Graham Cluley points out several examples of these practices…

+ read more

GeoffWebb
By: GeoffWebb
Jun 16, 2015
7:33 am
Reads:
2,360
Score:
Unrated

The rise of mobility in the workplace is prompting government agencies to investigate using multi-factor authentication for access to applications while maintaining compliance to Homeland Security Presidential Directive 12 (HSPD 12). Issued in 2004, this directive mandates common identification standards for federal employees and contractors. Among other security measures, HSPD 12 resulted in the use…

+ read more

David Shephard
Jun 11, 2015
7:13 am
Reads:
3,012
Score:
5

Over three decades ago, the game Pitfall! came out for the Atari game console. In it, you control a character named Pitfall Harry, swinging over pits and crocodiles, avoiding fire, scorpions and many other dangers in the jungle while racing to gather treasure. The world is just as rife with dangers to your mobile enterprise…

+ read more

Travis Greene
Dec 10, 2014
10:15 am
Reads:
2,269
Score:
Unrated

Bring-your-own-device adoption is steadily increasing, with Gartner projecting that 38 percent of companies will stop providing devices to workers by 2017.  As this trend accelerates globally, there has been an emergence of Bring Your Own Identity (BYOI), where employees can access organizational resources with their own defined identities. With an average of 25 accounts per…

+ read more

David Shephard
Jan 6, 2014
10:52 am
Reads:
57,551
Score:
Unrated
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow