Remove access-management cyber-insurance-mfa-requirement
article thumbnail

Don’t Bet on Passwords: Using MFA to Make Insuring Your Security Less of a Gamble

Duo's Security Blog

By this point, we’re all familiar with the list of requirements for a strong password: unique, long, memorable, free from any personal information… But even the strongest passwords can pose a risk if they’re the only thing standing between your users and enterprise content. trillion USD annually by 2025?

article thumbnail

Does moving to the cloud mean compromising on security?

Security Boulevard

However, some organisations are now moving back to on-premise systems due to concerns around high operational costs, cloud performance issues, or cyber security. Data encryption is a fundamental security measure that should be implemented to safeguard information from unauthorized access. But can be be secure, and if so - how?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

To Cover or Not to Cover: The Cyber Liability Insurance Quandary Facing Small- and Medium-Sized Businesses

Duo's Security Blog

Much has been published about how the demand — and subsequent cost — for cyber liability insurance has skyrocketed in line with increasing incidents of cyberattacks. The state of cyber liability insurance The topic of cyber liability insurance is full of datapoints, statistics and graphs all showing upward trajectories.

article thumbnail

The future of cyber insurance

IT Security Guru

Cyber insurers are losing money. Their loss ratios – total claims plus the insurer’s costs, divided by total premiums earned – are now consistently above 60%, which presents something of an existential threat to the insurance industry, making cyber risk a potentially uninsurable area due to falling profitability.

article thumbnail

How MFA and Cyber Liability Insurance Effectively Manage Risk in Higher Education

Duo's Security Blog

We need to work with many different teammates on campus — risk management, legal, compliance and institutional review boards, to name a few — to effectively manage cybersecurity risk across our communities. In a recent Duo blog post, we gave an overview of cyber liability insurance.

article thumbnail

Ready for Take-off: Rising Above Airport Cybersecurity Challenges

Thales Cloud Protection & Licensing

These bustling hubs require robust security systems to ensure the safety of passengers, staff, and infrastructure. Traditionally, airport security focused on physical access and the perimeter; however, in the years since 9/11, the digital footprint of the vast interconnected systems contains valuable assets that must be protected.

article thumbnail

3 Steps to Prevent a Case of Compromised Credentials

Duo's Security Blog

However, a whopping 59% of cyber incidents involved malicious actors exploiting compromised or stolen credentials. That gives attackers roughly 6 months to establish a foothold on a network, access sensitive data, and disrupt business activities. Immediate notification can also help trace other potential compromises.