Remove Authentication Remove Consumer Services Remove IT Remove Passwords
article thumbnail

CNIL Releases Guidance on Teleworking

Hunton Privacy

Implementing a Virtual Private Network (“VPN”) solution to avoid direct exposure of the organization’s services on the Internet. If possible, organizations should enable two-factor authentication for VPN login. More generally, employees should not do at home what they are not permitted to do in the workplace.

article thumbnail

NEW TECH: ‘Passwordless authentication’ takes us closer to eliminating passwords as the weak link

The Last Watchdog

If there ever was such a thing as a cybersecurity silver bullet it would do one thing really well: eliminate passwords. Threat actors have proven to be endlessly clever at abusing and misusing passwords. So what’s stopping us from getting rid of passwords altogether? Passwords may have been very effective securing Roman roads.

Passwords 164
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Original APT: Advanced Persistent Teenagers

Krebs on Security

“They would just keep jamming a few individuals to get [remote] access, read some onboarding documents, enroll a new 2FA [two-factor authentication method] and exfiltrate code or secrets, like a smash-and-grab,” the CXO said. Microsoft blogged about its attack at the hands of LAPSUS$, and about the group targeting its customers.

Phishing 240
article thumbnail

What will be your decisive moment to secure your cloud applications in a Zero Trust world?

Thales Cloud Protection & Licensing

The study also revealed that 94% of IT professionals say their organizations’ security policies around access management was influenced by breaches of consumer services in the last 12 months. Perhaps someday, password fatigue, frustration and password resets can truly be a thing of the past.

Cloud 115
article thumbnail

Selecting the Right Cloud SSO Solution for Your Organization

Thales Cloud Protection & Licensing

They need to maintain an easy user management access for cloud-based applications and services, without compromising on security. The traditional IAM model has been to extend remote employees to access applications to employees from VPN and add multifactor authentication (MFA) to add layers of security to the VPN connection.

Cloud 62