How to Calculate the True Cost of Your Hardware Tokens

Posted by: David Hald  /  23 February 2015 15:02:52 CET

Navigating the market for multi-factor authentication in search of the right solution can be tricky. This is especially true for companies looking to implement multi-factor authentication for the first time, but also for companies that already have a solution in place but are thinking about migrating to a more secure and convenient solution. At some point in your search you will likely encounter them: the hardware tokens. These first-generation two-factor authentication solutions come in many shapes and colors, but they all have four things in common:

Read More

Topics: Multi-factor Authentication, Token-free authentication

8 User Authentication Mistakes You Don't Want To Make In 2015

Posted by: David Hald  /  13 February 2015 14:52:34 CET

2015 is well underway. Looking back, it is clear that 2014 was another successful year for the hackers as the number of breaches continued to climb – with millions of records exposed as a result.

The good news is that, fortunately, more and more companies are recognizing that passwords are no longer enough to keep their data safe and are adding strong multi-factor authentication to keep their network and cloud applications secure. This trend will, without a doubt, continue in 2015, and I thought I would share a few tips to help those of you looking to step up your user authentication this year.

Here are eight user authentication mistakes to avoid:

Read More

Topics: Multi-factor Authentication, Security

How I Spotted the Microsoft Outlook App (iOS and Android) Is Using a Proxy

Posted by: Gunnar Hermansen  /  05 February 2015 16:56:00 CET

As many others I saw the Microsoft Outlook Client in the AppStore and installed it on my iPad. My iPad had never connected to our Exchange server before, so I began the process enrolling my device with SMS PASSCODE’s Secure Device Provisioning feature which is a standard component within our Multi-factor Authentication platform.

Read More

Topics: Security, Secure Device Provisioning

To Cloud or Not to Cloud

Posted by: David Hald  /  26 November 2014 16:39:00 CET

Recently, the cloud world experienced a huge punch to the gut. Microsoft Azure went down for some hours in different services, affecting millions of users in many different regions around the world. Once again, it raises the question of whether “cloud” is the right way to go or not. Perhaps the concern is that you can become “too cloudy.” I don´t believe anyone has the ultimate, definitive answer to that question – yet.

Read More

In The World of Mobile Security, Context is King

Posted by: Patrick Qureshi  /  20 November 2014 10:22:00 CET

The workforce is becoming increasingly mobile, offering greater convenience and productivity for employees on the go. However, this shift has created significant security concerns as well. Providing remote access to business applications and data can become a real IT headache as people move from one location to the next and log in from a variety of mobile devices.

Read More

Bringing Multi-factor Authentication to Enterprise File Transfer

Posted by: Torben Andersen  /  01 October 2014 09:23:00 CEST

 

Read More

Busting The Top Four Myths About Hacking

Posted by: Patrick Qureshi  /  10 September 2014 15:55:00 CEST

Knowing what’s myth and what’s fact is essential to avoid running unnecessary risks to your business. Myths can lead to false assumptions and thinking that your business is not at risk of being breached by hackers. So let's take a closer look at some of the most common myths out there.

1# Myth – Hackers only target the big brands

Read More

Don’t Let Hackers Crash Your Party

Posted by: Patrick Qureshi  /  02 September 2014 09:23:00 CEST

We can all agree that there are serious IT threats out there today that all companies need to protect themselves against. Working with IT security every day I have seen a lot of what today’s hacking community has to offer, yet I’m still amazed by the strength and sophistication of the hacking tools used to steal identities and breach corporate networks.

Read More

Surf’s up - Are You Ready For the Tidal Wave of Forgotten Passwords?

Posted by: Torben Andersen  /  19 August 2014 14:11:00 CEST

It is summer, surf is up and most of us already have or are planning to take some time off to relax and reload our batteries.

Now I don’t want to spoil your vacation or cause unnecessary stress, but have you thought about what happens when your employees return from summer vacation and cannot remember their passwords?

Read More

It’s a Bird…It’s a Plane…It’s SMS PASSCODE Version 7.2

Posted by: Claus E. Kotasek  /  20 June 2014 13:11:00 CEST

Today is a big day for the team here at SMS PASSCODE as we release SMS PASSCODE 7.2.

As most of you will recall we released version 7.0 earlier this year, which introduced a number of unique features to the market. Features such as Secure Device Provisioning (included as standard in the SMS PASSCODE MFA license) that enables secure and convenient self-enrollment of ActiveSync devices into an organization without the need to contact IT.

Read More

Follow this blog