Mobile Security Threat

Verizon recently released their 2021 Mobile Security Index report, and in it, they summarized their research findings by looking at 856 IT professionals. These people buy, secure, and manage the mobile and internet of things (IoT) devices for their companies.

In a year of firsts and unexpected experiences, what did they find?

The majority of us aren't doing what needs to be done to secure our personal and professional information. 45% of people believe that their companies were rushed to mobilize remotely, and therefore have had to sacrifice security to "get the job done." And while remote working was at one point a necessity, now it is being evaluated as a permanent solution for many companies.

Read more

How Did 2020 Change The Way We Work?

 

In March of 2020, work as we knew it instantly changed. We were used to an office environment where physical office space was the norm. Virtual meetings were the exception and were primarily used when clients were distant and travel was impossible. Although more and more companies had made working virtually more acceptable, the trend was merely beginning. The global pandemic of COVID-19 changed all of this. Many will look back on this year and remember it as a disaster. However, because of the challenging world pandemic, technology quickly evolved and was adopted faster than would have ever happened.

Read more

Texting Is Cool But Not For MFA

 

The question is not whether you should have multifactor authentication (MFA); instead, what type? MFA is utterly essential when it comes to your business and personal data security. In the world of multifactor authentication, not all avenues are created equal. Although having something is better than nothing, in this case, that is not the attitude that you should have concerning your security. In 2016, NIST (National Institute of Standards and Technology) proposed restricting the use of SMS or voice for MFA, and although they softened their approach, they still do not recommend this method of MFA. Microsoft recently began campaigning against using SMS or voice for MFA. Today we are going to look at why the big push and what avenue is best for MFA.

Read more

Multifactor Authentication: What type is best?

In regards to Multifactor Authentication, the question should not be if but instead what kind. Multifactor authentication (MFA) is vital to the security of your network. As Brian Sherman from Valeo was quoted, “Weaker MFA is better than no MFA.” However, if you can protect your data more thoroughly, then why wouldn’t you? Let’s take a look at the forms of MFA and how they will help keep your data safe.

Read more

Yubikey: Even More Security!

Yubikey by Yubiko was a hit at last week’s CES 2019. Fans of this multifactor authentication device were already singing its praises, but these praises multiplied when Yubiko announced it now is compatible with iPhones and will be available soon to all users. Yubiko is a relatively new company so many have not heard the incredible reputation it is developing in the world of data security so if you are one of these individuals, dial in now and continue reading! Large corporations like Google and Facebook, who have extreme needs to secure data are already on board with Yubiko and have seen great success with their security needs.

Read more

Just in Time for Apple Picking: IOS 12

As of last week, Apple had released massive changes to their operating system. This update is one of logic and usefulness unlike many updates in the past that were not always helpful but leaned more on the sparkly side. This round appears to be very well thought out and baked. The changes, in fact, have not only been suitable for the new devices but also seem to be great improvements to the older technology as well.

Read more

Password Managers:

What are they and how do they work?

Security is a top priority in business. Everywhere you turn someone’s data is being compromised. One of the highest recommended tips for security is to use a password manager, and luckily, it is one of the simplest methods as well. Although it is easy, many still hesitate as they do not fully understand what it is and where the passwords are being stored. Let’s take a high-level look at what password managers are and how they work.

Read more

Recent Posts

20 Critical Questions You Must Ask Before Hiring any IT Company