mfa

Security Awareness Deployment Guide – Securely Working at Home

Security Awareness Deployment Guide Securely Working at Home Executive Summary As a result of Coronavirus, many organizations are finding themselves transitioning their workforce to work from home. This can be a challenge as many organizations lack the policies, technology and training to secure a remote workforce. In addition, many employees may be unfamiliar or uncomfortable with the idea of working from home. The purpose of this guide is to enable you to quickly train those people to be secure as possible. If you have any questions on how to use this guide, reach out to us at support@sans.org. Since your workforce is most likely going through a great deal of …

Security Awareness Deployment Guide – Securely Working at Home Read More »

Security Awareness Deployment Guide Securely Working at Home

IDC PlanScape: Deploying Multifactor Authentication

IDC PlanScape: Deploying Multifactor Authentication EXECUTIVE SUMMARY Multifactor authentication provides organizations with an effective security control that overcomes the weaknesses of knowledge-based authentication and protects network, application, and data assets in an increasingly sophisticated threat environment. By combining passwords with physical devices and/or biometric measurements, organizations add a layer of strong security and protect themselves against password theft. Recent advances in multifactor authentication make this technology more accessible to nontechnical end users and allow widespread deployment throughout the organization. Using multifactor authentication may now be as simple as clicking a button on a pop-up window that appears on the smartphone that a user was already carrying. The simplicity of this …

IDC PlanScape: Deploying Multifactor Authentication Read More »

IDC PlanScape Deploying Multifactor Authentication

5 Identity Attacks That Exploit Your Broken Authentication

5 Identity Attacks That Exploit Your Broken Authentication Traditional authentication methods that rely on usernames and password integrity are widely considered to be broken. In fact, “Broken Authentication” sits at #2 in the OWASP Top 10 for application security risks. As organizations begin to move more sensitive data to cloud apps to take advantage of the productivity gains, the traditional perimeter expands to wherever the user is logging in from. In other words, the identity becomes the perimeter. Threat agents have recognized this as a security gap and are exploiting the natural proclivity for your employees to trust an inbound email from a familiar source, or their tendency to reuse …

5 Identity Attacks That Exploit Your Broken Authentication Read More »

5 Identity Attacks That Exploit Your Broken Authentication
Scroll to Top