News

Archive

Security Is Not Child’s Play!

My 10 year-old daughter walked into the kitchen laughing a few days ago. She had heard on the radio that the most common security password is “123456” or “password”. She said, “Are people crazy, Mom?”...

Cybersecurity Trends for 2016

An article last month points to a couple of interesting trends in the cybersecurity area. The first has to do with hackers not necessarily needing to be superiors coders, but simply smart about weaknesses and...

Average Cost of a Data Breach = $3.8 Million (USD)

In an earlier post, we read that the data breach against Target in late 2013 could cost over $500 million dollars (USD) in the end. While that amount is staggering, it is likely due to...

GreenRADIUS in Amazon Web Services (AWS)

Several organizations have moved in part or entirely to the cloud for their IT infrastructure. This article details the interesting story of the University of Notre Dame and its gradual adoption of and migration to...

Lost Device? GreenRADIUS Still Has You Covered

We hope everyone has a great Christmas and New Year’s season. This time of year usually means gathering with family and friends, enjoying good food, and taking a relaxing break from the office. Not so...

The Cost of Target’s Data Breach Keeps Growing

Last week, Target announced a $39 million dollar settlement with banks and credit unions to resolve claims related to the retailer’s data breach in late 2013. To refresh your memory, this breach compromised over 40...

Low 2FA Adoption Among U.S. Federal Agencies

A recent audit by the U.S. Government Accountability Office (GAO) revealed weaknesses in cybersecurity practices at various U.S. federal agencies. Among the weaknesses cited is the lack of implementing two-factor authentication (2FA). Twenty-two agencies reported...

Background Noise as Authentication data?

So new this week is the idea of “Sound Proof” authentication. The idea is that the microphone on your device would listen to the background noise where you are and determine if you are who...

U2F Presentation by Yubico CEO

As mentioned in previous posts here and here, FIDO standards have been gaining traction with governments and the private sector. Our enterprise partner Yubico produces YubiKeys employing FIDO’s U2F authentication standard which Google and Yubico...

It’s Only a Matter of Time Before Your Insurance Requires 2FA

So I came across this interesting article about an insurance company that paid for the cost of a breach is now suing to get the money back from the insured company because of poor security...