The death of passwords

February 8, 2019

Enterprises need to start preparing for a future without traditional passwords, according to LoginRadius.  Enterprises trying to keep customer data safe struggle with weak links in traditional authentication methods and employee practices, according to a recent infographic from LoginRadius. Most people fall into one of two categories: They use one password for every account, or they use a slightly different password for every account. However, neither of these approaches are very effective, the infographic noted. While 10 years ago, people only had to keep track of a password for email and banking, today, the average business user must keep track of nearly 200 passwords. Companies including Microsoft are making moves to replace traditional passwords with biometrics and security keys. Others are beginning to realize that commonly accepted methods for creating strong passwords are not actually effective.

Spotlight

Whitewood Security

Whitewood® addresses one of the most fundamental challenges associated with all modern cryptosystems – true random number generation. Whitewood enables its customers to take control of random number generation across their entire application infrastructure.

Other Infographics
news image

Necessity and Benefits of IoT Security Best Practices for Businesses

Infographic | February 24, 2022

While the IoT can bring new data and helpful insights, it can also introduce new vulnerabilities into your organization. The size of the IoT market was 15.8 billion in 2021. IoT security market is projected to grow to 18.6 billion in 2022. The market is predicted to nearly double in size by 2025. There were more than 1.5 billion IoT breaches from January to June 2021

Read More
news image

The Importance of Active Directory Security Best Practices

Infographic | February 9, 2022

There’s no silver bullet solution to cybersecurity, a layered defense is the only viable defense. Active directory (AD) security best practicesare crucial because they are central to many vulnerable functions, such as Network access.

Read More
news image

Cyber Security Checklist for 2019

Infographic | December 3, 2019

Over four in ten UK businesses(link is external) suffered a breach or attack during 2018-19, and 43% of cyber attacks are targeting small businesses(link is external). Use our easy to digest infographic to remind yourself and your staff of cyber security best practices, which have never been more important.

Read More
news image

Active directory IT security infographic

Infographic | January 24, 2020

Active Directory is a great technology. In fact I can’t image life without it. It’s pretty easy to set up, with every Microsoft Server release it gains additional options that make life for IT easier. Did you know that only 5% of 1000 fortune companies don’t use AD to organize their environment?

Read More
news image

Necessity of a Data Loss Prevention Strategy for Businesses

Infographic | February 9, 2022

A Data Loss Prevention (DLP) strategy is essential to protect sensitive data. Data loss prevention tools and software are designed to constantly monitor and filter data in real-time. In addition to dealing with the data being used, stored and transmitted within the network, data loss prevention applications ensure no harmful outside data is entering the company network.

Read More
news image

The Importance of Database Security

Infographic | February 3, 2022

Security is everyone’s responsibility. Enabling business, protecting data, and managing risks are critical to literally every business. Maintaining database security is important to safeguard highly confidential and sensitive data. Between January and September 2020, about 36 billion pieces of data were compromised. In 2021, data breach costs increased from USD 3.86 million to USD 4.24 million.

Read More

Spotlight

Whitewood Security

Whitewood® addresses one of the most fundamental challenges associated with all modern cryptosystems – true random number generation. Whitewood enables its customers to take control of random number generation across their entire application infrastructure.

Events