2 min read
Breaking the SMS Habit
Multifactor Authentication (MFA) is one of the most important controls to block account takeover fraud. There are many different forms of MFA...
2 min read
Multifactor Authentication (MFA) is one of the most important controls to block account takeover fraud. There are many different forms of MFA...
2 min read
It’s safe to say that remote work is here stay. While we are on the verge of opening back up after COVID, people have loved the flexibility that...
2 min read
Over the years, I have become wary of the term “best practice” when it is applied to technology and cybersecurity. The term “best practice” is...
2 min read
Qakbot (also known as Quakbot or Qbot) is a malware strain that has been used to attack financial institutions since 2008. It’s primary target is...
2 min read
Asset Management is one of the foundations of a sound Information Security Program, but it is also often neglected in the rush to replace or...
3 min read
Information security programs are like onions. They have layers. Understanding the control layers of an information security program helps management...
2 min read
Work and personal lives continue to blend as many employees are working from home and social distancing. Mobile devices, specifically phones, are...