Tag: MFA
Enhance security services with biometrics
Biometrics is exploding in popularity as a security tool with research indicating that 81 percent of consumers consider biometrics a more secure method of identity verification than traditional methods. Illustrating the embrace of this technology is the global biometric authentication...
The rise of AI-based BEC attacks
Cybercriminals are quickly latching on to new technology and strategies to improve the success rates of their social engineering-based email attacks. In the latest Barracuda Email Threats and Trends report, the company found that although traditional email scams like phishing are...
Cybersecurity Threat Advisory: Okta username flaw
Researchers have discovered a critical vulnerability in Okta which allows an user to authenticate to an account with a username longer than 52 characters without multi-factor authentication (MFA) enabled. Read this Cybersecurity Threat Advisory to learn how this may impact...
Tips to help your customers master the art of online safety
Strong cybersecurity awareness should be a priority every day, but October serves as a great reminder for all of us to stay vigilant. The Cybersecurity and Infrastructure Security Alliance (CISA) recommends the following simple yet powerful tips to boost online...
Threat Spotlight: The evolving use of QR codes in phishing attacks
QR code phishing, also known as quishing, is a type of social engineering attack. Cybercriminals try to trick victims into using the camera on their mobile phone to scan a QR code that goes to a malicious website to steal sensitive...
Take action! 30 Essential tips to boost your cybersecurity
October, declared as Cybersecurity Awareness Month, is the perfect time to revisit and reinforce your cybersecurity strategies, ensuring both you and your customers stay safe from the latest digital threats. Since 2004, the National Cybersecurity Division of the Department of...
Cybersecurity Threat Advisory: Veeam Backup security flaws
There were recently six vulnerabilities discovered in Veeam Backup and Replication. One of them is an unauthenticated remote code execution (RCE), while the other five include authenticated RCE, arbitrary file deletion, low-privileged multi-factor authentication (MFA) setting modification and MFA bypass,...
Reducing our reliance on passwords to boost security
Data breaches remain a serious threat to every business. In 2023, about half of them reported experiencing a data breach, according to the Data Breaches Investigations Report. In the United States, more than 90 million accounts were breached in the third...
Focus on cybersecurity to uplevel your MSP business
What matters most to an organization? The security of the devices that its platform operates on, or the data and information that is held on and moved across that platform? If you think they are both important, think again. A...
Ask an MSP Expert: How do seasoned MSPs outsmart threats?
In this edition of Ask an MSP Expert, we look at how with the ever-evolving cybersecurity landscape, managed service providers (MSPs) must be vigilant. This includes ensuring their managed security service offerings are up to the task of protecting their...