<img alt="" src="https://secure.hook6vein.com/218483.png" style="display:none;">

BIO-key Team

Recent Posts

BIO-key Team
by BIO-key Team 0 Comments
BIO-key Team
by BIO-key Team 0 Comments
BIO-key Team
by BIO-key Team 0 Comments

Passwordless eBook: The Benefits of Passwordless Authentication

Moving away from the password-based authentication method is a step in the right direction – but the answer isn’t always straightforward. Unfortunately, most passwordless options take a step backwards in terms of security by relying on tokens, devices or phones to execute the authentication process as a single factor. The core challenges with these methods include: 

Continue Reading →
BIO-key Team
by BIO-key Team 0 Comments
BIO-key Team
by BIO-key Team 0 Comments

We Asked IT Professionals – What Dish Would Cybersecurity Be?

As we approach the end of the year, many organizations and employees alike are beginning to wind down for the upcoming holiday season. Those living in the United States can look forward to large potluck dinners and family gatherings for the upcoming holiday – Thanksgiving.  

However, what makes Thanksgiving a “Thanksgiving dinner” is the classic dishes that are served throughout the night:...

Continue Reading →
BIO-key Team
by BIO-key Team 0 Comments
BIO-key Team
by BIO-key Team 0 Comments

Are Shared Workstations Secure? Why it's Important and How to Do It

 

Compromised credentials cause 61% of today's data breaches.1 Most of these data breaches stem from organizations using shared workstations, commonly done so by bank tellers, contact centers, hospitals or manufacturing facilities.

What is common amongst these businesses that have shared workstations is that they're in industries that are responsible for storing sensitive user data....

Continue Reading →

Tags: cybercriminals, identity bound biometrics, Shared Workstations

BIO-key Team
by BIO-key Team 0 Comments

Phone-less. Token-less: Less is More for Passwordless Authentication

By now, most organizations, across industries, understand that passwords are a cybersecurity risk and potential point of vulnerability - and for good reason. According to the World Economic Forum, weak and/or stolen passwords are the most common initial attack vector, representing 80% of all breaches. The response, however, is positive: 82% of business leaders say they are ready and willing to...

Continue Reading →
BIO-key Team
by BIO-key Team 0 Comments

Cybersecurity Awareness Month 2022: We Champion See You in Cyber

October is Cybersecurity Awareness Month, an international effort led by the Cybersecurity and Infrastructure Security Agency to raise cybersecurity awareness. As the risk of a cyber threat increases, end-users and administrators alike need to be more aware of how to defend themselves against cyberattacks.

Continue Reading →
BIO-key Team
by BIO-key Team 0 Comments

The Biometric Multi Factor Authentication Solution Changing the Game

"Good is the enemy of great" - Jim Collins.

When you look back on society's greatest advancements, how many were achieved by following the status quo? When you recall the most monumental awe-inspiring individual feats of all time, did those individuals achieve them by doing what everyone else was doing? As a culture, we see progress as a result of striving to do things better - even if that means...

Continue Reading →

Tags: Multi-Factor Authentication, Biometrics, identity bound biometrics