News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

iMFA: invisible multifactor authentication
B2B Cyber ​​Security ShortNews

Users often find passwords annoying, even though they can cause security gaps if used carelessly. A Google study has shown that not even 10 percent of users switch to the more secure variant of multi-factor authentication (MFA) because it seems too complex to them - and that after their account has already been hacked. In fact, any method of authentication is a balancing act between ease of use, security, and practicality. A solution that is supposed to replace passwords must be equally effective in all three points and better in at least one of them. One possible solution is invisible multi-factor authentication (invisible multifactor ...

Read more

Access data misuse doubles

F5 study: Incidents with login data doubled since 2016. Credential Stuffing Report extensively investigates credential abuse. The number of annual credential-related incidents nearly doubled from 2016 to 2020. This is shown by the current Credential Stuffing Report from F5. The largest study of its kind found a 46 percent decrease in the number of stolen credentials over the same period. The average amount of data fell from 63 million records in 2016 to 17 million last year. The mean size increased in 2020 (2 million records) to 234 percent compared to 2019 and was ...

Read more

Remedy against theft of sensitive data
Sensitive data intellectual property

Intellectual Property Theft: Ten ways to stop intellectual property theft. If sensitive data is stolen, companies not only face fines and reputational damage, but in the case of intellectual property they can also lose their competitive advantage. If attackers have successfully penetrated a company network, they can sell business-critical information to a competitor or nation state with competing global markets after successful theft. Here are ten measures that you can take immediately to ensure that companies of all sizes are better prepared to protect business-critical data. 1. Encrypt sensitive data The encryption of sensitive data is crucial for ...

Read more

CISO study: passwords are unsuitable
Survey CISO passwords

Ivanti study among CISOs: passwords for protecting corporate data are increasingly unsuitable. Remote working has accelerated the erosion of the traditional network perimeter, creating new IT security challenges for CISOs. The Corona-related “Everywhere Enterprise” has shifted the priorities of the CISOs: reducing mobile security risks has replaced combating network security threats as a top priority. This is the result of a current survey by Ivanti among those responsible for information security in companies. Almost nine in ten (87%) of the Chief Information Security Officers (CISO) surveyed agreed that mobile devices have become the focus of their cybersecurity strategies. Four of ...

Read more

OneLogin: global study on home office security
News B2B Cyber ​​Security

OneLogin, one of the world's leading companies in the field of identity and access management, today published a new global study examining the IT security implications of the increasing change on remote work due to the COVID-19 pandemic. The study of 5.000 home office workers from Germany, France, the United Kingdom, the Republic of Ireland and the United States shows that common security measures and tried and tested password procedures are often neglected in many regions. The full study is available at http://onelogin.com/blog/world-password-day-2020. Almost one in five (17,4%) of the people surveyed worldwide has the password for their work device either in their ...

Read more