Common passwords like "123456" and "password" are easily guessed by hackers. Strong passwords should be 12-16 characters long, mixing upper and lower case letters, numbers, and symbols. Unique ...
To download this white paper you’ll need an Infosecurity Magazine account. Log in or sign up below. Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security ...
As promised last issue, I’m re-printing a glossary of strong/second factor authentication methods that TriCipher provided me along with the results of its sponsored survey on people’s perceptions of ...
The most common way cyber-criminal hackers break into enterprise networks is by stealing or guessing usernames and passwords. The attacks, whether the goal is stealing information, executing a ...
Choosing the wrong authentication protocol could undermine security and limit future expansion. These are the recommended protocols for common use cases. Whether you host your authentication system ...
A couple of weeks ago, we outlined some of the concerns users have about the security of VPNs for corporate use, and some readers have written in saying that their concerns aren’t necessarily about ...
Two-factor authentication (2FA) adds a vital security layer by requiring both your password and a second verification step—like a phone code or app prompt—before ...
Almost every compromised Microsoft account lacks multi-factor authentication, but few organizations enable it even though it's available, according to Microsoft. In the tech giant's new Cyber Signals ...