Compromised credentials cause 61% of today's data breaches.1 Most of these data breaches stem from organizations using shared workstations, commonly done so by bank tellers, contact centers, hospitals or manufacturing facilities.
What is common amongst these businesses that have shared workstations is that they're in industries that are responsible for storing sensitive user data. Unfortunately,...Continue Reading →
By now, most organizations, across industries, understand that passwords are a cybersecurity risk and potential point of vulnerability - and for good reason. According to the World Economic Forum, weak and/or stolen passwords are the most common initial attack vector, representing 80% of all breaches. The response, however, is positive: 82% of business leaders say they are ready and willing to...Continue Reading →
October is Cybersecurity Awareness Month, an international effort led by the Cybersecurity and Infrastructure Security Agency to raise cybersecurity awareness. As the risk of a cyber threat increases, end-users and administrators alike need to be more aware of how to defend themselves against cyberattacks.Continue Reading →
"Good is the enemy of great" - Jim Collins.
When you look back on society's greatest advancements, how many were achieved by following the status quo? When you recall the most monumental awe-inspiring individual feats of all time, did those individuals achieve them by doing what everyone else was doing? As a culture, we see progress as a result of striving to do things better - even if that means...Continue Reading →
According to IBM, the average cost of a data breach was $4.24 million1. When companies compare that insurmountable cost to spending 10-20% of their annual budget on cybersecurity, it’s a hard pill to swallow when you hear companies save that money and face cyber risk.
Today, cybersecurity is a major investment, and companies need to be proactive in defending their network and assets....Continue Reading →
Whether you're an MFA pro ready to implement a security policy or authentication protocol, or a newcomer interested in learning the basics of multi-factor authentication, you've come to the right place. Our latest eBook, "Ranking Authentication Methods (And Choosing The Right One)" analyzes, explains and ranks the different methods of authentication supported by PortalGuard today.Continue Reading →
The financial services sector is one of the most heavily regulated industries in the world, with controls imposed by government and industry bodies on many aspects of operating within the sector. That should come as no surprise, given the wealth of data held by banks and other institutions on organizations and individuals, not to mention the wealth itself. There are many regulations that include...Continue Reading →
We don’t see threat actors as a group deciding to stop attacking the financial services sector. A win is too profitable, and the mere presence of threat signals can serve geopolitical goals. In other words, the financial sector will remain a key focus for cyberattacks and cyber fraud. Some threat actors unleash cyberattacks in pursuit of financial gain through malicious or nefarious means; others...Continue Reading →