Here's a scenario: your bank has implemented an unbreakable cybersecurity solution. It neutralizes any outside threat and keeps sensitive data like customer information as safe as possible. One day, you come into work to find that's all been compromised. At this point, you're asking yourself, "how could have this possibly happened?" Let's look beyond the security technology, itself.Continue Reading →
When an intruder breaks into your environment, you're not aware of when they broke in, how they broke in, and what they compromised. How do they break in? Well, Tessian suggests around 90% of data breaches1 are caused by social engineering - meaning, some type of human error and stolen passwords lead to a successful cyber attack.
Today, banks and other financial services are facing growing cyber...Continue Reading →
Why do some customers choose one bank over another? Is it because of quality of service? Wide coverage of ATMs? While most do value both of these, neither one is the leading consideration. Customers rely on banks to deploy first-class security measures to safeguard their most valued possessions and financial assets, making trust the most critical component when deciding on who to bank with. When...Continue Reading →
Are you and your IT team utilizing the best cybersecurity practices? Maybe you are, but the rest of your company doesn’t even know the basics.
During our 2022 Cyber Predictions webinar, we asked our panel of CISOs from a wide range of industries, “What advice do you have for companies reviewing their cybersecurity?”. Surprisingly enough, our panel all had very similar advice. From improving...Continue Reading →
After attending the NACo Annual Conference this year and having the pleasure of speaking with hundreds of county elected officials and their IT teams, it was clear that the topic of cybersecurity was top of mind for everyone. The recent headlines about cyberattacks, especially ransomware on major organizations including Tyler Technologies, Solarwinds, the Colonial Pipeline, JBS, and Kaseya...Continue Reading →
The Multi-factor Authentication (MFA) requirement for Salesforce is meant to add a layer of security and increase protection against unauthorized account access. Starting February 1st, 2022, Salesforce will require customers and users to utilize MFA to access Salesforce products. Customers do have the option to use an MFA solution provided by Salesforce or use a supported, third-party MFA...Continue Reading →
In today’s day and age, your organization is likely facing new cyberthreats, pushed to working remotely due to the COVID-19 pandemic, wanting to safeguard more sensitive files throughout the organization, or a mix of all the situations. IT administrators and managers have the difficult task of changing the cyber infrastructure to solve all these issues without heavily frustrating their users.Continue Reading →
At BIO-key, a lot has happened this year. With new product launches, insightful blogs, and sharing lots and lots of cybersecurity news, we’ve published more than 50 press releases, webinars, blogs, and eBooks in 2021.Continue Reading →
As we near 2022 and the holiday season, you as a CISO and your users have dealt with a lot in 2021. Your users are beginning to wrap up their projects and unwind from the year but your job as a CISO is never done. In the spirit of the holidays, here are a few holiday items you might be wishing you get from your users.Continue Reading →
Today, the term Zero Trust is now used frequently amongst IT professionals. While Zero Trust may appear to some to be another cyber buzzword, enterprises are actively working to understand what it means to have a Zero Trust architecture, and how to implement it. In the latest Osterman Research whitepaper, "Why Zero Trust is Important", two out of three organizations surveyed expect to achieve...Continue Reading →