This website uses cookies

We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.

OK

Posts tagged with two-factor authentication

password
2 Factor Authentication · Cybersecurity Strategy · Data Security

Authentication on PCs: Recommendations from Security Experts

Authentication is an important part of working on a computer, whether logging on, opening encrypted data or using web services like PayPal. Usernames and passwords still play an important role, even...

hier nicht weiter
2 Factor Authentication · Cybersecurity Strategy · VPN

Another plea for multi-factor authentication

A hacking and cyberespionage group is currently targeting industrial control systems at energy companies. According to a survey by Symantec they have broken into 27 corporate networks so far. The...

2 Factor Authentication · Cybersecurity Strategy · Data Security

Top 5 security vulnerabilities are always the same

The research and analyst firm techconsult issued a summary of the five major security vulnerabilities in SMEs and public organizations in Germany at the start of 2017. Their annual study...

2 Factor Authentication

Open Haus: Multi-Factor Authentication [VIDEO]

NCP has been present at a number of industry events throughout the year, from it-sa in Nuremberg to SC Congress in New York to INTERFACE in Denver. While these gatherings offer great opportunities for...

logins
2 Factor Authentication

CIA Director’s Hacked Email Shows Need for Multi-Factor Authentication

There’s a certain irony to the way the U.S. government approaches encryption and data privacy for its citizens, while simultaneously falling victim to major data breaches itself through embarrassing...

globe data lock
Industry Commentary

The Lessons of Cybersecurity Awareness Month and What to Expect in the Year Ahead

For 11 years now, the U.S. government has recognized October as Cybersecurity Awareness Month. While the original goal may have been to acknowledge the growing risks that cyberthreats pose to national...

33704611_s
2 Factor Authentication

Two’s (or More) Company: How to Use Two-Factor Authentication the Right Way

These days, you need a password to access every aspect of your digital life, and we all know how problematic that can be. You can either come up with a unique (albeit difficult-to-remember) password...

2 Factor Authentication · Rethink Remote Access

Two-Factor Authentication Transforms Even '123456' Into a Secure Password

Since 2011, the same two passwords have ranked as the most common (and worst) among users. Care to take a guess as to what they are?

2 Factor Authentication · Endpoint Management · IPsec · Posts · Rethink Remote Access · SSL · VPN

Countering Advanced Persistent Threats with Comprehensive Network Security

The technological savvy and tenacity of cyber criminals has never been greater, and IT administrators trying to prepare for impending attacks are often left backpedaling. With all of the different...

2 Factor Authentication · Endpoint Management · Industry Commentary · Shows

Black Hat 2013: Key Takeaways on Remote Access Security

With the books closed on what was quite possibly the most controversial Black Hat conference ever, let’s take a few minutes to reflect on all of the hot button issues relating to remote access that...