article thumbnail

Passkeys vs. Passwords: The State of Passkeys on Cloud Sites

Duo's Security Blog

Be sure to check out our upcoming webinar The State of Passkeys in the Enterprise on September 7th at 9am PST | 12pm EST. Passkeys and Cloud Sites Cloud sites are where the web applications are hosted. An alternate site cannot be substituted, mitigating the threat of phishing. Want to dig in deeper on the password vs. passkey debate?

article thumbnail

What's the Buzz on Passwordless?

Duo's Security Blog

Advisory CISO J. No Phishing, Please See the video at the blog post. To prevent phishing, your authentication solution should offer a few general properties. Passwordless should also raise the bar by substantially reducing or even eliminating the risk of phishing attacks. One Step at a Time See the video at the blog post.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

3 Steps to Prevent a Case of Compromised Credentials

Duo's Security Blog

In our previous two features, we covered the dangers of phishing (one method of credential compromise) and how to mitigate its impact on users. Cisco CISO Wolfgang Goerlich highlights the case for why passwords are kept around in The Life and Death of Passwords : “In an ideal world, we say goodbye to passwords altogether.

article thumbnail

Remote Working One Year On: What the Future Holds for Cybersecurity

Security Boulevard

In late 2020, HelpSystems research with CISOs of global financial organizations revealed that 45% of respondents reported an increase in cyber-attacks since the pandemic first emerged. Almost half the CISOs in the HelpSystems’ research admitted that they had already increased their investment in secure collaboration tools. Featured: .

article thumbnail

How MFA and Cyber Liability Insurance Effectively Manage Risk in Higher Education

Duo's Security Blog

Recently, while co-hosting a webinar that kicked off Cybersecurity Awareness Month, a panelist commented that cybersecurity and privacy are team sports on a campus, much like our athletic teams. The use of phishing to take over user accounts as a first step to gain access to a campus for a ransomware attack has been making the headlines.

article thumbnail

How to Enhance Data Loss Prevention in Office 365

Security Boulevard

Recent HelpSystems research with CISOs in global financial service organizations found that almost one-third believe data breaches have the potential to cause the most damage over the next 12 months. On-Demand Webinar: How to Enhance DLP in Office 365 Deep Dive Guide: Mitigating the Information Security Risks in Microsoft 365.

article thumbnail

BEC Attacks: Protecting Against the Most Insidious Cybercrime

SecureWorld News

Ryan Witt, Proofpoint's Managing Director for Healthcare, who joined the SecureWorld webinar Protecting Healthcare from Email Fraud Attacks, also shared the sentiment that BEC attacks have a larger impact than ransomware. Educate and defend against phishing attacks. Ransomware is kind of one of those kitchen table sort of topics.