News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Zero Trust: Paradigm Shift in Cybersecurity
Zero Trust: Paradigm Shift in Cybersecurity

Never trust, always verify – the “Zero Trust” security model follows this motto. No actor wishing to access resources is trusted. Rather, each individual access requires authentication. Time for a paradigm shift in cybersecurity. A comment from Sebastian Ganschow, Director Cybersecurity Solutions at NTT Ltd. The thinking behind Zero Trust is simple: implicit trust is itself a vulnerability that attackers can exploit for lateral movement and access to sensitive data. Because the fortress – i.e. the company network – has not been impregnable for a long time. Data…

Read more

Box: MFA via SMS could also be bypassed by attackers
Box: MFA via SMS could also be bypassed by attackers

Varonis security researchers have discovered a way to bypass multi-factor authentication (MFA) via SMS for Box accounts. Attackers with stolen credentials were able to compromise an organization's Box account and exfiltrate sensitive data without having to access the victim's phone. Security researchers reported this vulnerability to Box on November 3, 2021 via HackerOne, which prompted it to be closed. Just last month, Varonis Thread Labs demonstrated how to bypass Box's TOTP-based MFA. Both gaps make it clear that cloud security, even when using seemingly secure technologies, is never...

Read more

Security outlook 2022: multifactor authentication on the rise
B2B Cyber ​​Security ShortNews

In its forecasts for 2022, WatchGuard addresses, among other things, the new passwordless Windows authentication as well as rising costs for cyber insurance and (MFA) for remote access to company resources. The IT security experts at WatchGuard once again dealt with various security-related developments that have the potential to cause a stir in 2022. For example, the analysts at the WatchGuard Threat Lab assume that cyber criminals will quickly find ways to bypass the passwordless authentication that Microsoft Windows has proclaimed. At the same time, it is predicted that the rising costs of cyber insurance will lead to the spread of strong multifactor authentication (MFA) for remote access to ...

Read more

Multi-factor authentication: multiple protection against hackers
Multi-factor authentication: multiple protection against hackers

The high number of attacks in which compromised login data are misused shows that passwords alone are no longer sufficient as a trustworthy identification of legitimate users, but that the use of multi-factor authentication (MFA) has become a fundamental building block for corporate security. MFA requires users to provide convincing proof of their identity in addition to their login credentials. According to Microsoft, MFA can prevent identity-based attacks based on stolen credentials up to 99,9 percent. Even if a user's credentials are compromised, MFA attackers make it extremely difficult to circumvent the authentication requirements. How does multi-factor authentication work? MFA complements the authentication process ...

Read more

Every 2nd connection from the home office to the company network is poorly secured
G Data News

In Germany, people rarely use secure passwords, anti-virus programs or two-factor authentication. This exposes your data to unnecessary risk - both at work and at home. This is confirmed by the current “cybersecurity” survey by G DATA CyberDefense in cooperation with Statista and brand eins. There is a lot of catching up to do with IT protection measures in Germany - both in the private and professional environment. Particularly noticeable: only 45,2 percent of employees who work completely from home use VPN, i.e. a secure network connection to the company. In other words: every second connection from the home office to ...

Read more

Uniform risk analysis of authentication attempts
Access access authentication

Silverfort and Ping Identity jointly rely on a uniform risk analysis of authentication attempts. Product integration provides comprehensive visibility and assessment of access activities, enabling customers to identify and respond to threats. Silverfort, a Unified Identity Protection company, recently started working with Ping Identity. Together they want to support customers with a standardized risk analysis of authentication and access attempts - both in local and in multi-cloud environments. This is to identify and prevent identity-based attacks. 61 percent of attacks are based on stolen credentials According to the Verizon 2021 Data Breach Investigations Report ...

Read more

Encryption and 2-factor authentication for SMEs
B2B Cyber ​​Security ShortNews

Prevent cyber attacks and data theft with reliable encryption and 2-factor authentication. HiCrypt and SmartLogon ensure more simplicity in implementation. The number of cyber attacks on German companies has increased dramatically in recent years. Studies show that data theft, sabotage or espionage affect the entire economy and the damage runs into billions. And the trend towards home offices since the beginning of the pandemic means additional IT security challenges, says Matthias Kirchhoff, Managing Director of digitronic computersysteme gmbh. The IT service provider offers solutions for the reliable encryption of sensitive data as well as a 2-factor authentication that doesn't leave a backdoor ...

Read more

Passwordless multifactor authentication
B2B Cyber ​​Security ShortNews

SystoLOCK is a solution for real multifactor authentication without any passwords. With the major release 2021.05, Systola mainly took care of adjustments for the server and various clients. The update contains many new features that make password-free login even better and faster. The improvements for VPN connectivity and for large RDP installations are particularly noteworthy for the release. In addition, a SAML Identity Provider for older Windows versions was introduced. This means that versions from 201R2 to 2019 can also use the authentication service. In addition, the new identity provider also brings improvements to Office 365 logins. Numerous innovations through major release ...

Read more

Document management with triple authentication
Access access authentication

PROXESS publishes a whitepaper on cybersecurity to protect company data and integrates comprehensive security functions with triple authentication in its document management solution (DMS). With the three-stage security program of its document management solution, PROXESS manages the balancing act between user-friendliness, comprehensive protection and audit-proof storage of documents - TÜV-tested, in accordance with legal requirements and with additional smart card PIN authorization for supervisors. However, to protect corporate data comprehensively, a cybersecurity strategy is also required for the rest of the company's IT infrastructure. PROXESS is currently offering a free whitepaper on the topic with a guideline for defending against cyberattacks. PROXESS 3 a scalable DMS The software provider and ...

Read more

OneLogin: global study on home office security
News B2B Cyber ​​Security

OneLogin, one of the world's leading companies in the field of identity and access management, today published a new global study examining the IT security implications of the increasing change on remote work due to the COVID-19 pandemic. The study of 5.000 home office workers from Germany, France, the United Kingdom, the Republic of Ireland and the United States shows that common security measures and tried and tested password procedures are often neglected in many regions. The full study is available at http://onelogin.com/blog/world-password-day-2020. Almost one in five (17,4%) of the people surveyed worldwide has the password for their work device either in their ...

Read more