The 2019 State of Password and Authentication Security Behaviors Report

January 16, 2019

There are a growing number of security breaches happening daily to both individuals and businesses. As a result, organizations and online services have shifted efforts in recent years to help educate employees and end users on proper password hygiene, two-factor authentication, signs of a phishing scam, and so on. Despite our worsening state of online security, are we becoming more security-minded individuals, and better yet, are we putting it into practice? Ponemon Institute is pleased to present the results of The 2019 State of Password and Authentication Security Behaviors Report, sponsored by Yubico.

Spotlight

ADACOM Cyber Security

ADACOM is a Cyber Security solution provider and a PKI CSP with offices in Tel Aviv, Athens, Belgrade and London. We implement projects for Financial Institutions, Telcos and large organizations in more than 30 countries across ΕΜΕΑ. ADACOM enables security online preserving business continuity with projects in Network Security, Endpoint & Host Protection, GRC & Assurance, Data Governance, Security Analytics and PKI & Strong Authentication. With over 1000 certifications, ADACOM has partnerships with technology vendors including large and small innovative companies. ADACOM is ISO/IEC 27001:2013 and ISO 9001:2008 certified.

OTHER WHITEPAPERS
news image

DeltaV™ Mobile Security Manual

whitePaper | October 26, 2022

DeltaV™ Mobile provides read-only access to process data and alarms on mobile devices. The solution includes a combination of software and hardware integrated with your existing network

Read More
news image

Application Security in a Multi-Cloud World

whitePaper | October 18, 2022

In the mad dash to the cloud, organizations have turned their application environments into a miscellaneous mess. Whether it be private, public or on-premise, organizations are leveraging heterogenous application hosting environments as they transition to the next phase of cloud computing: The multi-cloud.

Read More
news image

Check The Locks

whitePaper | October 4, 2022

Organizations have invested millions towards improved information security since the start of the pandemic, which galvanized a worldwide explosion of cybercrime. C-suites are increasingly recognizing cybersecurity as a business risk, viewing its necessity as more than just an IT problem.

Read More
news image

identity and zero trust - H-ISAC

whitePaper | August 25, 2022

These days, you can’t have a conversation about cybersecurity without talking about zero trust. The security concept requires that all individuals and devices on a network be continuously authenticated, authorized, and monitored. Gone are the days of letting someone in the front door, giving them a role with access privileges and then having them go about their merry way.

Read More
news image

How to Prepare For & Respond to Ransomware in Operational Technology Environments

whitePaper | March 14, 2023

Targeted intrusions for gaining long-term access and collecting data about industrial control systems (ICS) are becoming much more frequent. Many of these attacks are about understanding the network and preparing for future activities without causing any immediate impact. The most recent Dragos Year in Review6 report shows that the ransomware groups Lockbit 2.0 and Conti were responsible for more than half of the observed ransomware attacks in industrial environments in 2021, and that these instances resulted in actions on objectives. These attacks have been observed in almost every industrial vertical, primarily targeting small to medium-sized organizations in manufacturing.

Read More
news image

Adobe Operational Security Overview

whitePaper | December 30, 2022

With a cloud footprint that includes public and private clouds across different providers, the Adobe® multi-cloud strategy requires consistent and repeatable guardrails that are readily available to our product and service teams. To that end, our dedicated operational security team focuses on securing cloud resources at scale and helping ensure the safety and security of customer applications and data within our continually evolving cloud infrastructure operations.

Read More

Spotlight

ADACOM Cyber Security

ADACOM is a Cyber Security solution provider and a PKI CSP with offices in Tel Aviv, Athens, Belgrade and London. We implement projects for Financial Institutions, Telcos and large organizations in more than 30 countries across ΕΜΕΑ. ADACOM enables security online preserving business continuity with projects in Network Security, Endpoint & Host Protection, GRC & Assurance, Data Governance, Security Analytics and PKI & Strong Authentication. With over 1000 certifications, ADACOM has partnerships with technology vendors including large and small innovative companies. ADACOM is ISO/IEC 27001:2013 and ISO 9001:2008 certified.

Events