Top 5 Configuration Mistakes That Create Field Days for Hackers

Having appropriate security configurations requires your applications, servers and databases to be hardened in accordance with best practices. Continue reading Top 5 Configuration Mistakes That Create Field Days for Hackers

Long Live the Password — Even if You Don’t Want It To

To reduce the risk of a breach due to weak or stolen passwords, companies are adopting multifactor authentication, which requires users to submit an extra piece of data in addition to their password.

The post Long Live the Password — Even if You Don’t Want It To appeared first on Security Intelligence.

Continue reading Long Live the Password — Even if You Don’t Want It To

Reap the Promise of One and Done Authentication With SSO

With SSO, employees can use one set of credentials to access all their apps instead of remembering, looking up and frequently resetting multiple passwords.

The post Reap the Promise of One and Done Authentication With SSO appeared first on Security Intelligence.

Continue reading Reap the Promise of One and Done Authentication With SSO

Are Passwords Killing Your Customer Experience? Try Passwordless Authentication

By implementing passwordless authentication, organizations can deliver the experience customers deserve and the security they demand.

The post Are Passwords Killing Your Customer Experience? Try Passwordless Authentication appeared first on Security Intelligence.

Continue reading Are Passwords Killing Your Customer Experience? Try Passwordless Authentication