article thumbnail

9 tips to prevent phishing

CSO Magazine

Phishing , in which an attacker sends a deceptive email tricks the recipient into giving up information or downloading a file, is a decades-old practice that still is responsible for innumerable IT headaches. The fight against phishing is a frustrating one, and it falls squarely onto IT's shoulders.

Phishing 136
article thumbnail

8 top multifactor authentication products and how to choose an MFA solution

CSO Magazine

Whether it’s advanced phishing techniques, credential stuffing, or even credentials compromised through social engineering or breaches of a third-party service, credentials are easily the most vulnerable point in defending corporate systems. Get the latest from CSO by signing up for our newsletters. ]

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Credential stuffing explained: How to prevent, detect, and defend against it

CSO Magazine

Credential stuffing is the automated use of collected usernames and passwords to gain fraudulent access to user accounts. These credentials fuel the underground economy and are used for everything from spam to phishing and account takeovers. Check out the password hall of shame (and 10 tips for better password security). |

CSO 119
article thumbnail

Legacy, password-based authentication systems are failing enterprise security, says study

CSO Magazine

Authentication-related attacks grew in 2022, taking advantage of outdated, password-based authentication systems, according to a study commissioned by HYPR, a passwordless multifactor authentication (MFA) provider based in the US. To read this article in full, please click here

article thumbnail

Who is your biggest insider threat?

CSO Magazine

In his career, he has seen people pick up and use dropped thumb drives, give up passwords over the phone and, yes, even click on simulated phishing links. Sign up for CSO newsletters. ]. He has also seen the real-world consequences of such actions.

article thumbnail

BrandPost: Hardening Identities with Phish-Resistant MFA

CSO Magazine

For many years, multi-factor authentication has been a key approach to mitigating the risks associated with password usage. Government Towards Zero Trust Cybersecurity Principles ,” that has made significant progress raising awareness about the need for phish resistance in combination with MFA usage.

article thumbnail

Why it might be time to consider using FIDO-based authentication devices

CSO Magazine

Every business needs a secure way to collect, manage, and authenticate passwords. Storing passwords in the browser and sending one-time access codes by SMS or authenticator apps can be bypassed by phishing. Unfortunately, no method is foolproof. To read this article in full, please click here