It is your job to play strategically. Every move you make is done with research, thought, and only after a thorough risk assessment. You follow industry trends, consumer habits, and you’ve done your best to craft your online experience to satisfy. However, what if I told you just following suit is no longer enough? Satisfying the industry norm will not give you a competitive advantage in this crowded marketplace.Read More
A quick glance at headlines can tell you that the cost of cybercrime is on the rise. But we’ve put a number to it; data breaches have risen 62% over the past five years. This could now easily set an organization back an average of $11.7 million per year, according to a joint report from Accenture and the Ponemon Institute.
Although this may sound dire now, it gets worse. Information Age predicts that these attacks will globally cost companies $6 trillion annually by 2021, becoming more profitable than the entire illegal drug trafficking industry worldwide. Despite the many advanced cybersecurity products and best practices available to businesses today, one simple fact remains: hackers fight dirty and they seem to be getting smarter by the day.Read More
Blockchain is the hottest buzzword surrounding data security for 2018. It shows promising technology, but will likely take years to realize its full potential. It’s not currently the complete solution for every problem, as many Chief Information Officers (CIOs), Chief Technology Officers (CTOs) and Chief Information Security Officers (CISOs) have been led to believe.
While it’s certainly important to secure data at rest—and we encourage you to do all you can in that regard—don’t overlook the vulnerability surrounding user identity and authentication. It doesn’t matter how secure you think your data is if the wrong person can still access it.
Let’s take a dive into blockchain technology in order to understand its strengths and weaknesses.
You did it. You poured hours—not to mention blood, sweat, and tears—into your product and if you’re lucky, your customers are just as excited as you are.
But even though you’re doing well, maybe you’re not getting quite as many logins as you should be. People are dropping off on the sign-up page.
Aha! you think. I’ll just make login easier by using a social login. Just one click, and new customers will be signing up in droves.
After all, you remember reading that password fatigue—mental weariness from remembering all those logins--is real. You want to make things simpler for your customers so you can drive more logins.
But are social logins the answer? While their ease of use makes them appealing on a superficial level, we think the risks are increasingly greater than the ... Read More
With more attention and investments being made in cybersecurity in general and specifically to Identity & Access Management (IAM), one term has made a recent comeback in cybersecurity vernacular: the Trusted Device. Trusted devices are a powerful tool in the IAM toolkit.
However, while cybersecurity vendors are very familiar with trusted devices, most businesses are not, and don’t understand how useful they can be. In this post, we’ll explain how inBay defines a trusted device in the context of Identity Assurance and Management. We believe this will help you understand how to provision and utilize trusted devices in your IAM approach.
In its simplest form, a trusted device is a computing device that you own and consider “secure.” It's something you wear, have in your pocket or carry in your bag. From an IT admin's perspective, it's a device that the ... Read More
Cyberattacks and cyber-threats continue to grow in frequency and sophistication. If you are a CISO or IT professional in a mid-market or larger company where access security is imperative, here are 5 important cybersecurity threats that you must put on your focus list.Read More
If you’re a fan of The Today Show, you may have seen their segment on Wednesday, February 28th highlighting the increased danger around identity and access management. In the segment, a part of their Hacking of America series, NBC’s Tom Costello shared that your passwords may already be for sale on the internet.
Here’s the key takeaway from their story: No matter how strong you think your passwords are, security experts say they’re probably no strong enough. Here’s the segment if you haven’t seen it:
The General Data Protection Regulation (GDPR) goes into effect on May 25, 2018. The GDPR is a new regulation that will require businesses to protect the personal data and privacy of European Union (EU) citizens for transactions that occur within EU member states. If your company does business in Europe, or is a company that collects data on citizens in EU countries, here’s what you need to know about GDPR.Read More
As much as we’d like them to, cybercriminals don’t stay still. They’re always working on their next greatest crime. The dynamic and fast-moving nature of cyberattacks outpaces the cybersecurity solutions designed as quick fixes. In fact, as soon as one solution is discovered, cybercriminals are already working on their next mode of attack.
This makes it difficult to keep valuable data secure. You must stay abreast of the current cybersecurity trends in order to keep informed, gain knowledge and brace yourself for the latest attack.
Here is a mix of fresh and familiar threats to watch for this year: