You're Not as Unique as You Think You Are!

All I’d need to know to guess one of your end users’ passwords is the name of every person important to them, how frequently they use profanity, their favorite pop culture franchises, any sports teams they like, and their favorite vehicle. Where did I get this information, you ask? It’s a trend I’ve noticed on the list of top 10,000 most easily guessed passwords. More specifically, the top 200...

Continue Reading →

Tags: Authentication Security, End user experience, MFA, Multi-Factor Authentication, multilayer authentication, Password, password fatigue, password reset, password strength, data breach, password alternatives, password best practices, password complexity, password encryption, password expiration, Password Management, password manager, password quality, Password Security, Password Synchronization, passphrase, regular password changes, changing your password often, easily guessed passwords, trochees

by Eric Jeffers 0 Comments
by Kody Pinette 0 Comments

Strengthen your Account Security with MFA

Most of us use password-based authentication every day, a form of Single-Factor Authentication, which is the process of using personal credentials to securely access a system. Did you know that 54% of consumers use 5 or fewer passwords for every single one of their accounts? This means that if a hacker were to crack one of their passwords, chances are that they've also gained access to...

Continue Reading →

Tags: 2FA, MFA, Multi-Factor Authentication, strong password, OTP, OTP Authentication, Password Security, Printed OTP, Single-Factor Authentication, Two-Factor Authentication, #twofactor, secure login, OTP Methods, stolen passwords, password policies, secure passwords, mobile authentication, password age, VoiceIt, Biometrics, changing your password often, mobile authenticator, information systems, maintain data privacy, SSO Process, voice biometrics, secure acounts, password-based authentication, compliances

Cybersecurity for the Next Generation

As technology continues to advance it is vital for children to understand the potential risks that are out there and how to be cyber aware when online. Children ages 8-18 spend an average of 7 hours and 38 minutes online. During this time, they may be exposed to cyberbullying, cyber predators, and identity theft. In each child there seems to be an inherent trust in the technology that...

Continue Reading →

Tags: Authentication, Authentication Security, #cyberattacks, #cybersecurity, #2FA, #2ndfactor, Cyber Security, hackers, sign on to web applications, password policies, password generator, password habits, challenge questions, impersonations, cybercriminals, enforcing strong passwords, cyber aware generation, changing your password often, cyber aware, cyberbullying, teach cybersecurity, cyber predators, children and technology