Not Your Father’s Cybersecurity Tips: Think Outside the Box to Protect Your Identity During NCSAM

These five cybersecurity tips can help users review and update their online practices to protect their identities from advanced threats.

The post Not Your Father’s Cybersecurity Tips: Think Outside the Box to Protect Your Identity During NCSAM appeared first on Security Intelligence.

Continue reading Not Your Father’s Cybersecurity Tips: Think Outside the Box to Protect Your Identity During NCSAM

The Untapped Potential of Two-Factor Authentication

Two-factor authentication methods are more secure than passwords alone but require widespread adoption to be universally effective.

The post The Untapped Potential of Two-Factor Authentication appeared first on Security Intelligence.

Continue reading The Untapped Potential of Two-Factor Authentication

Viewing Cybersecurity From the Consumer’s Perspective

In today’s complex ecosystem of connected devices, cybersecurity is a key consideration for consumers when shopping for products and services.

The post Viewing Cybersecurity From the Consumer’s Perspective appeared first on Security Intelligence.

Continue reading Viewing Cybersecurity From the Consumer’s Perspective

Ransomware, Trojans and Fraud, Oh My! Tracking Recent Cybercrime Trends and Patterns

As banking and retail institutions adopt stronger security measures, cybercrime trends are shifting to maximize fraudsters’ ROI.

The post Ransomware, Trojans and Fraud, Oh My! Tracking Recent Cybercrime Trends and Patterns appeared first on Security Intelligence.

Continue reading Ransomware, Trojans and Fraud, Oh My! Tracking Recent Cybercrime Trends and Patterns

Don’t Leave Home Without These Five Travel Security Tips

Tourists should follow these travel security best practices to protect their devices and data from cybercriminals, especially in foreign countries.

The post Don’t Leave Home Without These Five Travel Security Tips appeared first on Security Intelligence.

Continue reading Don’t Leave Home Without These Five Travel Security Tips

Shakespeare, the Wizard of Oz and Multifactor Authentication

Multifactor authentication, a critical component of identity and access management, has been described in literature since Shakespeare’s time.

The post Shakespeare, the Wizard of Oz and Multifactor Authentication appeared first on Security Intelligence.

Continue reading Shakespeare, the Wizard of Oz and Multifactor Authentication

Shakespeare, the Wizard of Oz and Multifactor Authentication

Multifactor authentication, a critical component of identity and access management, has been described in literature since Shakespeare’s time.

The post Shakespeare, the Wizard of Oz and Multifactor Authentication appeared first on Security Intelligence.

Continue reading Shakespeare, the Wizard of Oz and Multifactor Authentication

IAM Feeling Good? What CISOs Should Know About the Feeling of Identity and Access Management Solutions

Identity and access management (IAM) is critical, but an inconvenient authentication process makes for a lousy user experience.

The post IAM Feeling Good? What CISOs Should Know About the Feeling of Identity and Access Management Solutions appeared first on Security Intelligence.

Continue reading IAM Feeling Good? What CISOs Should Know About the Feeling of Identity and Access Management Solutions

IAM Feeling Good? What CISOs Should Know About the Feeling of Identity and Access Management Solutions

Identity and access management (IAM) is critical, but an inconvenient authentication process makes for a lousy user experience.

The post IAM Feeling Good? What CISOs Should Know About the Feeling of Identity and Access Management Solutions appeared first on Security Intelligence.

Continue reading IAM Feeling Good? What CISOs Should Know About the Feeling of Identity and Access Management Solutions

Two-Factor Authentication: A Little Goes a Long Way

Online services are understandably reluctant to add steps to the login process, but a little two-factor authentication can significantly boost security.

The post Two-Factor Authentication: A Little Goes a Long Way appeared first on Security Intelligence.

Continue reading Two-Factor Authentication: A Little Goes a Long Way