<img alt="" src="https://secure.hook6vein.com/218483.png" style="display:none;">
by BIO-key Team 0 Comments

Is Biometric Authentication on Smartphones Secure?

Over 85% of the world’s population own a smartphone in 20231, and many smartphone vendors, such as Samsung and Apple, have introduced biometric authentication capabilities to enhance the overall user experience, including fingerprint scanning, face, and voice recognition. In fact, Cisco reported that 81% of all smartphones have built-in biometrics capabilities in 20222. 

As more users adopt ...

Continue Reading →

Tags: Biometrics

by BIO-key Team 0 Comments

Modern Approach to Bolster Supply Chain Cybersecurity

To say it’s been an eventful few years for supply chain risk management would be a massive understatement. From delays and disruptions to complete ceases in activity, supply chains have seen it all. While this chaos sparked a tremendous amount of innovation around supply chain technology – which is a positive thing – it also created a vast world of new opportunities for cyber criminals.  

Continue Reading →
by BIO-key Team 0 Comments

Pros and Cons: Cybersecurity Outsourcing

Let’s start with the basics. What exactly is outsourcing cybersecurity? Outsourced cybersecurity is when an organization enlists the support of an outside third-party to manage a range of sophisticated security needs, including network security, operational security, application security, and information security. This can be a daunting undertaking for many companies, which is why the use of...

Continue Reading →
by BIO-key Team 0 Comments
by BIO-key Team 0 Comments
by BIO-key Team 0 Comments

Passwordless eBook: The Benefits of Passwordless Authentication

Moving away from the password-based authentication method is a step in the right direction – but the answer isn’t always straightforward. Unfortunately, most passwordless options take a step backwards in terms of security by relying on tokens, devices or phones to execute the authentication process as a single factor. The core challenges with these methods include: 

Continue Reading →
by BIO-key Team 0 Comments
by BIO-key Team 0 Comments

We Asked IT Professionals – What Dish Would Cybersecurity Be?

As we approach the end of the year, many organizations and employees alike are beginning to wind down for the upcoming holiday season. Those living in the United States can look forward to large potluck dinners and family gatherings for the upcoming holiday – Thanksgiving.  

However, what makes Thanksgiving a “Thanksgiving dinner” is the classic dishes that are served throughout the night:...

Continue Reading →
by BIO-key Team 0 Comments
by BIO-key Team 0 Comments

Are Shared Workstations Secure? Why it's Important and How to Do It

 

Compromised credentials cause 61% of today's data breaches.1 Most of these data breaches stem from organizations using shared workstations, commonly done so by bank tellers, contact centers, hospitals or manufacturing facilities.

What is common amongst these businesses that have shared workstations is that they're in industries that are responsible for storing sensitive user data....

Continue Reading →

Tags: cybercriminals, identity bound biometrics, Shared Workstations