Saying that regulatory pressure is over loading financial services IT departments is a bit like saying people don’t trust real estate agents – it’s stating the obvious. And it has gotten a whole lot worse since the global financial meltdown. As investment bankers played black jack with retail banking customers’ cash, the regulators had to put measures in place to protect consumers, their data and above all, their money.
Barely a week goes by without some enormous organization falling foul to a cyber attack and the financial services industry is far from immune. With its potentially sky-high rewards, the financial services sector is right up there on the hackers’ most wanted list.
Remote working used to be a dirty word in business circles didn’t it? Organizations thought workers couldn’t be trusted to work out of sight – they might be watching day-time TV or slipping off to the gym. But they are slowly coming around to the idea that rather than impede productivity, remote working actually makes a workforce far more productive.
Last month – as you’ve probably read - a group of hobbyist hackers announced they had cracked 11.2 million user passwords from the troubled dating website Ashley Madison. Adding insult to injury, the group, called Cynosure Prime went on to publish the top 100 passwords. Revealing themselves as technologically inept, as well as morally questionable, passwords included “123456” in the top spot, followed by “12345” and “password.” I don’t think that even more obscure ones such as “secret” and “affair” would give your average hacker sleepless nights.
It is exciting times as we officially release version 8 of our platform for multi-factor authentication.
During October we held a number of launch events celebrating the arrival of version 8, and I had the pleasure of hosting the one held in Denmark. Here we welcomed our community of customers and partners who were among the first to see the highlights in version 8.
In a world where evil lurks at every connection point, one sometimes has to think and act differently! I predict that in a near future, the way we think and act in the authentication space will change.
You’re back in the office after a well deserved break, staring at your screen trying to remember your password. You have failed the first two attempts and now have just one attempt left before your account gets locked. What to do?
Don’t Build a Truck Factory if You Just Need a Truck
IT operations managers around the world know they ought to roll out multi-factor authentication (MFA) to secure their Citrix NetScaler remote access, and like everyone else, they are looking for the best possible solution to fix their problem. But many fear the process of adding this type of technology. Why? Because the traditional hardware token providers have created the impression that securing your business with strong user authentication is a huge undertaking that requires creating complicated databases and specialist consultants and involves high costs and many IT resources. Furthermore the many different vendors of strong authentication have their own and different agendas that makes the choice hard – what to pick?
We all know the story of Little Red Riding Hood. A girl walks through the woods to visit her grandmother. The Big Bad Wolf tricks her into revealing Granny’s address. Wolf goes to Granny’s house and gains entry by pretending to be Little Red. The Wolf eats Granny, then he polishes off Little Red. At the end of the day, both are saved by a kind-hearted, axe-wielding woodsman. The moral of the story? Be careful you’re not accidentally letting in a wolf.
Your Salesforce CRM stores the data for all of your customers, your potential customers and your pipeline. Can you imagine if this information fell into the wrong hands? Or even worse, if it was destroyed?
Many customers think that if they have data in the cloud, Salesforce is taking care of security and their data is protected. But if last year’s high number of breaches taught us anything, it’s that hackers not only find creative new ways to break through security but also still rely on tried-and-true methods like stolen or guessed passwords. The bottom line is that passwords alone are no longer enough to authenticate users accessing your CRM.