BIO-key Team
Recent Posts
And Why is Identity-Bound Biometrics Different?
Continue Reading →Moving away from the password-based authentication method is a step in the right direction – but the answer isn’t always straightforward. Unfortunately, most passwordless options take a step backwards in terms of security by relying on tokens, devices or phones to execute the authentication process as a single factor. The core challenges with these methods include:
Continue Reading →As we approach the end of the year, many organizations and employees alike are beginning to wind down for the upcoming holiday season. Those living in the United States can look forward to large potluck dinners and family gatherings for the upcoming holiday – Thanksgiving.
However, what makes Thanksgiving a “Thanksgiving dinner” is the classic dishes that are served throughout the night:...
Continue Reading →
Compromised credentials cause 61% of today's data breaches.1 Most of these data breaches stem from organizations using shared workstations, commonly done so by bank tellers, contact centers, hospitals or manufacturing facilities.
What is common amongst these businesses that have shared workstations is that they're in industries that are responsible for storing sensitive user data....
Continue Reading →Tags: cybercriminals, identity bound biometrics, Shared Workstations
By now, most organizations, across industries, understand that passwords are a cybersecurity risk and potential point of vulnerability - and for good reason. According to the World Economic Forum, weak and/or stolen passwords are the most common initial attack vector, representing 80% of all breaches. The response, however, is positive: 82% of business leaders say they are ready and willing to...
Continue Reading →October is Cybersecurity Awareness Month, an international effort led by the Cybersecurity and Infrastructure Security Agency to raise cybersecurity awareness. As the risk of a cyber threat increases, end-users and administrators alike need to be more aware of how to defend themselves against cyberattacks.
Continue Reading →"Good is the enemy of great" - Jim Collins.
When you look back on society's greatest advancements, how many were achieved by following the status quo? When you recall the most monumental awe-inspiring individual feats of all time, did those individuals achieve them by doing what everyone else was doing? As a culture, we see progress as a result of striving to do things better - even if that means...
Continue Reading →Tags: Multi-Factor Authentication, Biometrics, identity bound biometrics