Do Weak Passwords Keep You Up at Night? Here is Why They Should…

Posted by: Torben Andersen  /  18 November 2015 12:00:00 CET

Last month – as you’ve probably read - a group of hobbyist hackers announced they had cracked 11.2 million user passwords from the troubled dating website Ashley Madison. Adding insult to injury, the group, called Cynosure Prime went on to publish the top 100 passwords. Revealing themselves as technologically inept, as well as morally questionable, passwords included  “123456” in the top spot, followed by “12345” and “password.” I don’t think that even more obscure ones such as “secret” and “affair” would give your average hacker sleepless nights.

Read More

Topics: Multi-factor Authentication, Security, Compliance

How Do You Design Tomorrow’s Security?

Posted by: Claus Rosendal  /  02 November 2015 12:37:00 CET

It is exciting times as we officially release version 8 of our platform for multi-factor authentication.

During October we held a number of launch events celebrating the arrival of version 8, and I had the pleasure of hosting the one held in Denmark. Here we welcomed our community of customers and partners who were among the first to see the highlights in version 8.

Read More

Topics: Multi-factor Authentication, Security, SMS PASSCODE

Should You Be Whitelisting Instead of Blacklisting in User Authentication?

Posted by: David Hald  /  26 August 2015 14:00:04 CEST

In a world where evil lurks at every connection point, one sometimes has to think and act differently! I predict that in a near future, the way we think and act in the authentication space will change.

Read More

Topics: Multi-factor Authentication, Security

Forgot Your Password? Take One of These and Call Me in the Morning.

Posted by: David Hald  /  12 August 2015 14:35:00 CEST

You’re back in the office after a well deserved break, staring at your screen trying to remember your password. You have failed the first two attempts and now have just one attempt left before your account gets locked. What to do?

Read More

Topics: Password Reset, Productivity

Why Your Citrix NetScaler Needs the Best in Multi-factor Authentication

Posted by: David Hald  /  29 July 2015 13:04:06 CEST

Don’t Build a Truck Factory if You Just Need a Truck
IT operations managers around the world know they ought to roll out multi-factor authentication (MFA) to secure their Citrix NetScaler remote access, and like everyone else, they are looking for the best possible solution to fix their problem. But many fear the process of adding this type of technology. Why? Because the traditional hardware token providers have created the impression that securing your business with strong user authentication is a huge undertaking that requires creating complicated databases and specialist consultants and involves high costs and many IT resources. Furthermore the many different vendors of strong authentication have their own and different agendas that makes the choice hard – what to pick?

Read More

Topics: Multi-factor Authentication, Security, Citrix

Have You Activated Multi-factor Authentication on Your Cisco VPN Yet?

Posted by: David Hald  /  24 June 2015 15:26:00 CEST

We all know the story of Little Red Riding Hood. A girl walks through the woods to visit her grandmother. The Big Bad Wolf tricks her into revealing Granny’s address. Wolf goes to Granny’s house and gains entry by pretending to be Little Red. The Wolf eats Granny, then he polishes off Little Red. At the end of the day, both are saved by a kind-hearted, axe-wielding woodsman. The moral of the story? Be careful you’re not accidentally letting in a wolf.

Read More

Topics: Multi-factor Authentication, Security, VPN, CISCO

Why Multi-factor Authentication for Your Salesforce CRM can't Wait

Posted by: David Hald  /  10 June 2015 16:15:00 CEST

Your Salesforce CRM stores the data for all of your customers, your potential customers and your pipeline. Can you imagine if this information fell into the wrong hands? Or even worse, if it was destroyed?

Many customers think that if they have data in the cloud, Salesforce is taking care of security and their data is protected. But if last year’s high number of breaches taught us anything, it’s that hackers not only find creative new ways to break through security but also still rely on tried-and-true methods like stolen or guessed passwords. The bottom line is that passwords alone are no longer enough to authenticate users accessing your CRM.

Read More

Topics: Cloud, Multi-factor Authentication, Security, Salesforce

3 Signs That Hackers Could Be Reading Your Email

Posted by: David Hald  /  26 May 2015 12:14:10 CEST

Email usually contains the most confidential information that an organization has – board minutes, customer information, and so on. Once a hacker is able to access someone’s email, he or she can access all types of sensitive information.

In a world where 76 percent of all network breaches involve weak or stolen passwords, it’s clear that passwords are not strong enough to secure anything. Email in particular has become both a prize in itself and a means of entrée into a target organization’s network.

The widespread use of remote access to conduct business has increased the number of entry points for cyber criminals by an order of magnitude. Most people don’t realize, for instance, that ActiveSync-enabled mobile devices create a security vulnerability that can grant easy access to your email. All a hacker needs is an email address and a password.

Read More

Topics: Multi-factor Authentication, Security, Secure Device Provisioning, Outlook Web Access (OWA)

Would You Sacrifice Your IT Security for a Smartphone App?

Posted by: Kennet Johansen  /  24 April 2015 15:10:00 CEST

During the last couple of years there has been a tendency towards the usage of Apps on smartphones for user authentication, as many perceive them to be friendly and useful.

In a world of rising security concerns and hackers constantly developing new ways of breaching companies, one could argue that smartphone Apps pose major security concerns, and should not be used for user authentication.

Read More

Topics: Multi-factor Authentication, Security, Authentication Apps

What Your Hardware Tokens Tell Me About Your Company

Posted by: David Hald  /  10 April 2015 14:25:00 CEST

The last time a hardware token was cutting edge technology, you had a mobile phone the size of a shoebox.

You could rock out at a "Europe" concert listening to their super hit “Final Countdown” (which, by the way, might have been a hidden message about hardware tokens) while having peace of mind by knowing your data was being protected by the latest security the ‘80s had to offer.

Just because it’s 2015 doesn’t automatically mean that a technology is obsolete, right? If you believe that, I have a fax machine I’d like to sell you.

Read More

Topics: Multi-factor Authentication, Token-free authentication