article thumbnail

Eliminate the Password, Eliminate the Password Problem.

The Security Ledger

Weak, stolen or reused passwords are the root of 8 in 10 data breaches. Fixing the data breach problem means abandoning passwords for something more secure. But what does passwordless authentication even look like? Episode 163: Cyber Risk has a Dunning-Kruger Problem Also: Bad Password Habits start at Home.

article thumbnail

Kroll Employee SIM-Swapped for Crypto Investor Data

Krebs on Security

Countless websites and online services use SMS text messages for both password resets and multi-factor authentication. A major portion of Kroll’s business comes from helping organizations manage cyber risk. This may require stepping through the website’s account recovery or lost password flow.

Mobile 207
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Passwordless? Imagining the Future of Authentication

The Security Ledger

The average employee in the workplace has 191 passwords. Gerald Beuchelt, the Chief Information Security Officer at LogMeIn talks about how changes in authentication may deliver a passwordless future. Imagining the Future of Authentication appeared first on The Security. Also: making Passwords work.

article thumbnail

NEW TECH: Devolutions’ ‘PAM’ solution helps SMBs deal with rising authentication risks

The Last Watchdog

Devolutions is a Montreal, Canada-based company that provides remote connection in addition to password and privileged access management (PAM) solutions to SMBs. Poorly implemented authentication can also lead to network breaches and compliance headaches. Productivity is also a concern, with multiple tools requiring passwords.

article thumbnail

How to Use Your Asset Management Software to Reduce Cyber Risks

CyberSecurity Insiders

Yes, one lapse on a spam email, one inadequate password, one abandoned account, or a malfunctioning asset can cause havoc. . The extension is called Code Verify and reassures the WhatsApp web version whether their session is authenticated or not, eliminating the threat of the text being tampered in transmission.

article thumbnail

As Cyber Attacks Mount, Small Businesses seek Authentication Fix

The Security Ledger

The post As Cyber Attacks Mount, Small Businesses seek Authentication. » Related Stories Opinion: AI and Machine Learning will power both Cyber Offense and Defense in 2020 Passwordless? Imagining the Future of Authentication Episode 163: Cyber Risk has a Dunning-Kruger Problem Also: Bad Password Habits start at Home.

article thumbnail

Episode 163: Cyber Risk has a Dunning-Kruger Problem also: Bad Password Habits start at Home

The Security Ledger

Kevin Richards of the insurer Marsh joins us to talk about that company's Cyber Risk Perceptions Survey. » Related Stories Explained: Two-Factor vs. Multi-Factor Authentication RSA warns Digital Transformation is supercharging Digital Risk Episode 149: How Real is the Huawei Risk? Read the whole entry. »