What Is Step-Up Authentication and Where Does It Come Into Play?

Step-up authentication is the process of transitioning from a single authentication factor to multiple factors, but when should you use this? And why?
The post What Is Step-Up Authentication and Where Does It Come Into Play? appeared first on JumpCloud… Continue reading What Is Step-Up Authentication and Where Does It Come Into Play?

Choosing the Best MFA Approach: Device-Based vs Application-Level Multi-Factor Authentication

IT organizations need to consider two major types of Multi-factor Authentication: device-based MFA and application-level MFA.
The post Choosing the Best MFA Approach: Device-Based vs Application-Level Multi-Factor Authentication appeared first on JumpC… Continue reading Choosing the Best MFA Approach: Device-Based vs Application-Level Multi-Factor Authentication

Evaluating the Accessibility of Different MFA Factors

Explore the accessibility of different MFA factors, what they demand of users, and how to accommodate or provide alternatives to inaccessible factors.
The post Evaluating the Accessibility of Different MFA Factors appeared first on JumpCloud.
The post… Continue reading Evaluating the Accessibility of Different MFA Factors

Dutch police bust alleged ‘Fraud Family’ phishing service members

Dutch police have arrested two people for their alleged involvement in a phishing fraud-as-a-service scheme, one of them a 15-year-old suspect and the other a 24-year-old due to appear in court on Friday. Authorities got an assist from security vendor Group-IB in the arrests for the “Dutch-speaking syndicate that develops, sells and rents sophisticated phishing frameworks,” according to the company. Group-IB had dubbed the syndicate and its “massive” operation “Fraud Family.” The unnamed 24-year-old is accused of developing the phishing service kits, while the 15-year-old allegedly sold them. The younger suspect was released pending further investigation. Dutch police also said they searched a third 18-year-old suspect. Group-IB said the Fraud Family operation, which has mainly hit victims in the Netherlands and Belgium since at least 2020 but perhaps as far back as 2018, is focused on stealing banking credentials. The criminals advertised their service to less-skilled cyber crooks on the […]

The post Dutch police bust alleged ‘Fraud Family’ phishing service members appeared first on CyberScoop.

Continue reading Dutch police bust alleged ‘Fraud Family’ phishing service members

What Are The Different Factors Of Multi-Factor Authentication (MFA)?

Learn more about the different types of factors you can use to develop a multi-factor authentication (MFA) protocol for your organization.
The post What Are The Different Factors Of Multi-Factor Authentication (MFA)? appeared first on JumpCloud.
The po… Continue reading What Are The Different Factors Of Multi-Factor Authentication (MFA)?

Why combining FIDO2 and PKI provides broader enterprise-wide security

This past year’s seismic shift in how and where people access corporate resources has heightened the urgent need for organizations to upgrade the identity and authentication systems they rely on. That urgency isn’t likely to diminish anytime soon, according to a 2021 Gartner CIO survey. The survey found that 64% of employees at CIOs’ organizations are now able to work from home, and two-fifths are actually doing so, suggesting the landscape for authenticating users has clearly taken on new and more dynamic contours. But it’s not just people accessing enterprise resources. The transition to cloud-based services and the underlying automation supporting digital workloads have led to dramatic increases in the volume of non-human entities — virtual machines, mobile devices, applications, containers, and IoT/OT devices — all seeking their own access to enterprise resources independent of the end user’s identity. As a result, managing machine identities has also become part of […]

The post Why combining FIDO2 and PKI provides broader enterprise-wide security appeared first on CyberScoop.

Continue reading Why combining FIDO2 and PKI provides broader enterprise-wide security

Google to make multi-factor authentication its default mode

Google will soon enroll users into multi-factor authentication by default, the technology giant said on Thursday. In a blog post commemorating World Password Day, the company announced the move to make users sign in via a second step after entering a password, such as a phone app. “Today we ask people who have enrolled in two-step verification (2SV) to confirm it’s really them with a simple tap via a Google prompt on their phone whenever they sign in. Soon we’ll start automatically enrolling users in 2SV if their accounts are appropriately configured,” wrote Mark Risher, director of product management, identity and user security. “Using their mobile device to sign in gives people a safer and more secure authentication experience than passwords alone.” While multi-factor authentication isn’t entirely foolproof, and users will be allowed to opt out, Google’s embrace of automatically enrollment could be a big security boon. Microsoft said its […]

The post Google to make multi-factor authentication its default mode appeared first on CyberScoop.

Continue reading Google to make multi-factor authentication its default mode

Biden’s cyber executive order to include new rules for federal agencies, contractors

Under a forthcoming White House order, companies that do business with the federal government would have to meet software security standards and swiftly report cyber incidents to a new entity within the Department of Homeland Security, sources familiar with a draft version of the document said. The order, which could be made public in a matter of weeks, is meant to improve the government’s ability to detect, coordinate, response to and investigate cybersecurity incidents, as well as promote supply chain security and push government contractors to up their defenses. It is spurred largely by the suspected Russian campaign in which hackers exploited the update process for SolarWinds’ Orion software, which led to the compromise of nine federal agencies and roughly 100 companies, the White House previously said. Some of the order’s measures are aimed at strengthening DHS and its Cybersecurity and Infrastructure Security Agency. The White House directive would establish […]

The post Biden’s cyber executive order to include new rules for federal agencies, contractors appeared first on CyberScoop.

Continue reading Biden’s cyber executive order to include new rules for federal agencies, contractors

Multi-Factor Authentication: What Is It and Why Should You Use It?

What is multi-factor authentication and how does it work in practice for IT professionals and end users? Learn more in this first of three-part MFA series.
The post Multi-Factor Authentication: What Is It and Why Should You Use It? appeared first on Ju… Continue reading Multi-Factor Authentication: What Is It and Why Should You Use It?

The JumpCloud Lounge Q&A Roundup: Enrolling in JumpCloud MDM, Pulling Disk Space, & Using Hardware for MFA

IT admins talk about enrolling in JumpCloud MDM, pulling disk space with System Insights, and MFA. Try JumpCloud Free.
The post The JumpCloud Lounge Q&A Roundup: Enrolling in JumpCloud MDM, Pulling Disk Space, & Using Hardware for MFA appeared … Continue reading The JumpCloud Lounge Q&A Roundup: Enrolling in JumpCloud MDM, Pulling Disk Space, & Using Hardware for MFA