Post of category 2 Factor Authentication

Blog · 2 Factor Authentication · Cybersecurity Strategy · Data Security

Friend or Foe: The Importance of Multi-Factor Authentication

The days when only permanent, office-based staff with company-approved devices could have remote access to corporate resources via Virtual Private Networks (VPNs) are long gone. Now those needing...

2 Factor Authentication · Cybersecurity Strategy

Naivety, absurdity or just plain and understandable frustration? Why do we not learn from our mistakes in cybersecurity?

More than half of all users active on the Internet (55%) have been affected by fraud, according to a study by FICO. But this has by no means led to better security precautions and increased awareness....

2 Factor Authentication · Cybersecurity Strategy · Data Security

WebAuthn – The next nail in the coffin for usernames and passwords

It's a lingering death, but at some point the last username/password combination will be entered. This is a good thing, because one data breach after another shows that neither the private sector nor...

password
2 Factor Authentication · Cybersecurity Strategy · Data Security

Authentication on PCs: Recommendations from Security Experts

Authentication is an important part of working on a computer, whether logging on, opening encrypted data or using web services like PayPal. Usernames and passwords still play an important role, even...

hier nicht weiter
2 Factor Authentication · Cybersecurity Strategy · VPN

Another plea for multi-factor authentication

A hacking and cyberespionage group is currently targeting industrial control systems at energy companies. According to a survey by Symantec they have broken into 27 corporate networks so far. The...

SEC_Govies_2017_web
2 Factor Authentication · Awards · Endpoint Management · VPN

NCP Secure Enterprise iOS Client Wins Government Security Award

The Government Security Awards (“The Govies”), organized by Security Today magazine, once again bestowed its top Network Security honors upon NCP. The awards were presented at a ceremony during ISC...

2 Factor Authentication · Cybersecurity Strategy · Data Security

Top 5 security vulnerabilities are always the same

The research and analyst firm techconsult issued a summary of the five major security vulnerabilities in SMEs and public organizations in Germany at the start of 2017. Their annual study...

Data protection
2 Factor Authentication · Cybersecurity Strategy · Data Security

The national economic protection strategy in Germany and real life

When it comes to security, public authorities in any country also want to represent their interests, some more intensively than others. Germany is not lacking in initiatives and organizations that...

2 Factor Authentication

Open Haus: Multi-Factor Authentication [VIDEO]

NCP has been present at a number of industry events throughout the year, from it-sa in Nuremberg to SC Congress in New York to INTERFACE in Denver. While these gatherings offer great opportunities for...

logins
2 Factor Authentication

CIA Director’s Hacked Email Shows Need for Multi-Factor Authentication

There’s a certain irony to the way the U.S. government approaches encryption and data privacy for its citizens, while simultaneously falling victim to major data breaches itself through embarrassing...

This website uses cookies

We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.

OK