3 Signs That Hackers Could Be Reading Your Email

Posted by: David Hald  /  26 May 2015 12:14:10 CEST

Email usually contains the most confidential information that an organization has – board minutes, customer information, and so on. Once a hacker is able to access someone’s email, he or she can access all types of sensitive information.

In a world where 76 percent of all network breaches involve weak or stolen passwords, it’s clear that passwords are not strong enough to secure anything. Email in particular has become both a prize in itself and a means of entrée into a target organization’s network.

The widespread use of remote access to conduct business has increased the number of entry points for cyber criminals by an order of magnitude. Most people don’t realize, for instance, that ActiveSync-enabled mobile devices create a security vulnerability that can grant easy access to your email. All a hacker needs is an email address and a password.

Read More

Topics: Multi-factor Authentication, Security, Secure Device Provisioning, Outlook Web Access (OWA)

Would You Sacrifice Your IT Security for a Smartphone App?

Posted by: Kennet Johansen  /  24 April 2015 15:10:00 CEST

During the last couple of years there has been a tendency towards the usage of Apps on smartphones for user authentication, as many perceive them to be friendly and useful.

In a world of rising security concerns and hackers constantly developing new ways of breaching companies, one could argue that smartphone Apps pose major security concerns, and should not be used for user authentication.

Read More

Topics: Multi-factor Authentication, Security, Authentication Apps

What Your Hardware Tokens Tell Me About Your Company

Posted by: David Hald  /  10 April 2015 14:25:00 CEST

The last time a hardware token was cutting edge technology, you had a mobile phone the size of a shoebox.

You could rock out at a "Europe" concert listening to their super hit “Final Countdown” (which, by the way, might have been a hidden message about hardware tokens) while having peace of mind by knowing your data was being protected by the latest security the ‘80s had to offer.

Just because it’s 2015 doesn’t automatically mean that a technology is obsolete, right? If you believe that, I have a fax machine I’d like to sell you.

Read More

Topics: Multi-factor Authentication, Token-free authentication

Why Ditching Your Hardware Tokens Can Boost Your Productivity

Posted by: David Hald  /  30 March 2015 16:03:00 CEST

It is widely accepted nowadays that a company’s people are its most important asset. It follows, then, that how productive those people are has a significant impact on the business’s ability to execute on day-to-day operations and achieve short- and long-term goals.

Multi-factor authentication is most often thought of in terms of organizational security, and rightly so. Concerns about cyber threats are the reason companies adopt an authentication strategy. But have you ever considered the effect such a strategy can have on employee productivity?

Read More

Topics: Multi-factor Authentication, Token-free authentication

How Token-free Authentication Improves User Compliance

Posted by: David Hald  /  20 March 2015 14:23:00 CET

“My Dog Ate the Hardware Token”
Hardware tokens were once the gold standard in user authentication, but they have met with resistance all along. Many IT admins have reported that their users never really adopted the hard tokens. They are cumbersome to use and, being physical objects, employees have to carry around something extra. This approach is bound to fail, as employees will forget their hardware token from time to time or misplace it and need to have a new one sent to them. Excuses like “My dog ate my hardware token” might be funny at first, but the avalanche of calls to your IT department from frustrated employees who cannot log in will quickly become a pain for both IT and the other employees.
Read More

Topics: Multi-factor Authentication, Security, Token-free authentication, Compliance

Think Your Hardware Tokens Keep You Safe? Think Again.

Posted by: David Hald  /  06 March 2015 13:59:00 CET

Trends such as BYOD and the widespread use of cloud services have expanded the threat landscape and put a strain on IT security. For instance, Gartner predicts that by 2016, eight percent of companies expect to stop providing devices to workers, and more than 30 percent of BYOD strategies will leverage personal applications, data and social connections for enterprise purposes.

Read More

Topics: Security, Token-free authentication

How to Calculate the True Cost of Your Hardware Tokens

Posted by: David Hald  /  23 February 2015 15:02:00 CET

Navigating the market for multi-factor authentication in search of the right solution can be tricky. This is especially true for companies looking to implement multi-factor authentication for the first time, but also for companies that already have a solution in place but are thinking about migrating to a more secure and convenient solution. At some point in your search you will likely encounter them: the hardware tokens. These first-generation two-factor authentication solutions come in many shapes and colors, but they all have four things in common:

Read More

Topics: Multi-factor Authentication, Token-free authentication

8 User Authentication Mistakes You Don't Want To Make In 2015

Posted by: David Hald  /  13 February 2015 14:52:00 CET

2015 is well underway. Looking back, it is clear that 2014 was another successful year for the hackers as the number of breaches continued to climb – with millions of records exposed as a result.

The good news is that, fortunately, more and more companies are recognizing that passwords are no longer enough to keep their data safe and are adding strong multi-factor authentication to keep their network and cloud applications secure. This trend will, without a doubt, continue in 2015, and I thought I would share a few tips to help those of you looking to step up your user authentication this year.

Here are eight user authentication mistakes to avoid:

Read More

Topics: Multi-factor Authentication, Security

How I Spotted the Microsoft Outlook App (iOS and Android) Is Using a Proxy

Posted by: Gunnar Hermansen  /  05 February 2015 16:56:00 CET

As many others I saw the Microsoft Outlook Client in the AppStore and installed it on my iPad. My iPad had never connected to our Exchange server before, so I began the process enrolling my device with SMS PASSCODE’s Secure Device Provisioning feature which is a standard component within our Multi-factor Authentication platform.

Read More

Topics: Security, Secure Device Provisioning

To Cloud or Not to Cloud

Posted by: David Hald  /  26 November 2014 16:39:00 CET

Recently, the cloud world experienced a huge punch to the gut. Microsoft Azure went down for some hours in different services, affecting millions of users in many different regions around the world. Once again, it raises the question of whether “cloud” is the right way to go or not. Perhaps the concern is that you can become “too cloudy.” I don´t believe anyone has the ultimate, definitive answer to that question – yet.

Read More