Why multifactor authentication is important for cybersecurity

Passwords play a critical role in preventing unauthorized account access. Unfortunately, the Google-Harris Poll 2019 password survey showed that many Americans have poor password practices. The survey’s highlights included:

24% of respondents use common passwords such as “abc123,” “Iloveyou,” and “Qwerty”

59% of respondents integrate easy-to-guess personal information (e.g., birthdays) in their passwords

22% of respondents use their own name as part of their password for at least one account

43% of respondents share their passwords with other people

66% of respondents used the same passwords across multiple accounts (e.g., online banking, email, and social media networks)

55% of respondents did not change their password after a breach

Given that the average American has about 200 accounts that require passwords, it’s no wonder people resort to using weak passwords that are easy to remember or reusing passwords for several accounts.

7 Best practices for patch management

By now, most computer users are at least vaguely familiar with the need to keep their software up to date. But hitting the “remind me later” button when a software update notification pops up is still a common practice. The problem with this is that it only takes one unpatched software to expose your business to a major cyberattack.

Why your business needs an up-to-date anti-malware solution

When it comes to information security, much of the attention is on human error, which makes sense given how most data breaches occur at the hands of social engineering scams designed to exploit human ignorance and unpreparedness. Some even question whether traditional antivirus solutions are even still relevant in an age when phishing scammers can circumvent them with ease.

How to strengthen your BYOD security

Mobile technology has drastically changed the way we live. And just as many people have “cut the cord” in their homes and now rely on their smart devices, businesses are now adopting the bring your own device (BYOD) trend culture. But BYOD also opens your organization up to cybersecurity risks. Here’s how you can improve […]

Fix these enterprise security flaws now

As businesses have become more reliant on digital technology for day-to-day operations, they’ve also become a favorite target of internet threats. If you want to protect your organization from cyberattacks, make sure your security is clear of the following flaws. Open wireless networks With one main internet line and a couple of wireless routers, a […]

5 Security issues to look out for

The security of your systems and technology is a constant battle, and one you will likely never completely win. There are significant steps you can take to secure your systems, but having knowledge about your systems is one of the most effective tools. If you know how your systems can be breached, you can ensure […]

A complete guide to juice jacking

Smartphones have become such a vital component of the modern lifestyle to the point that we are always glued to them. And as our time with our gadgets increases, the need to recharge them while we’re on the go also increases. When you’re nowhere near your charger and your juice runs out, that public charging […]

We just released a free eBook, Demystifying the Cloud: What it is and why you should careDOWNLOAD
+ +