article thumbnail

Can Cloud Services Encourage Better Login Security? Netflix's Accidental Model

Dark Reading

Netflix's unpopular password-sharing policy change had a positive cybersecurity silver lining. Can more B2C service providers nudge their users toward secure authentication?

B2C 94
article thumbnail

MY TAKE: How consumer-grade VPNs are enabling individuals to do DIY security

The Last Watchdog

I’ve written this countless times: keep your antivirus updated, click judiciously, practice good password hygiene. I’ve since discovered that there’s a heck of a lot going on in the B2C VPN space. The leading B2C VPNs all recognize this and have begun promoting the use of personal VPNs as, essentially, a DIY security tool.

B2C 212
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Access Control: The 5 Single Sign-On Benefits

IT Security Guru

Using the same password for all software applications increase the chances of cybercriminals learning an individual’s log-in credentials and gaining unauthorized access – resulting in data theft, identity theft and other harm. Single Sign-On (SSO) is a solution that combats password fatigue. fewer requests to reset passwords).

article thumbnail

Q&A: Here’s why VPNs are likely to remain a valuable DIY security tool for consumers, SMBs

The Last Watchdog

For this study, a data breach was defined as an intruder copying or leaking user data such as names, surnames, email addresses, passwords, etc. More than two thirds of American accounts are leaked with the password, putting breached users in danger of account takeover. That’s for the B2C users. Essential security tool.

VPN 208
article thumbnail

Veridium Named Winner in the Coveted Global InfoSec Awards During RSA Conference 2021

CyberSecurity Insiders

With over 5 million monthly readers and growing, and thousands of pages of searchable online infosec content, Cyber Defense Magazine is the premier source of IT security information for B2B and B2G with our sister magazine Cyber Security Magazine for B2C. Low code, agile, and flexible.

InfoSec 52
article thumbnail

Respecting Privacy and Data Protection: World Consumer Rights Day

Thales Cloud Protection & Licensing

As business-to-consumer (B2C) interactions increasingly rely on digitized or automated processes, consumers are asked to do more in order to reap the benefits. Improving the consumer user experience Often a primary driver for deploying or upgrading CIAM solutions is the desire (or need) to improve the consumer experience.

Retail 71
article thumbnail

NEW TECH: Cequence Security launches platform to shield apps, APIs from malicious botnets

The Last Watchdog

Stolen usernames and passwords are loaded up on botnets, which then relentlessly test them on account logon pages. Botnets can test stolen usernames and passwords at scale. Thus, what we’re experiencing today is the blossoming of B2B and B2C commerce transacted digitally.