Why text may not be the best choice for two-factor authentication
Many cyberattacks are carried out using stolen or weak credentials. Which is why the security industry is encouraging us to take more care of our logins by adding two-factor authentication (2FA). This means that after entering your password, you have to enter a verification code that’s sent to you via another device. There are a […]
Read MoreCloud access could be crucial to US-China trade
Trade talks – some would call it a trade dispute – between the United States and China have been ongoing for several months [1] with goods, services and the threat of tariffs and an all-out trade war at the heart of the negotiations. But it’s emerged this week that the cloud could be a key […]
Read MoreThe effect of remote working on systems security
In the past, most office workers were in the same location most of the time. In the modern business world, however, thanks to flexible working patterns, the need for some staff to be mobile means that it’s increasingly common for staff to switch between locations, work from home, or use mobile devices on the move. […]
Read MoreThe number of cyber security breaches is down – but is it too soon to celebrate?
New figures from the Department for Digital, Culture, Media and Sport reveal that the number of businesses reporting breaches and cyber attacks has fallen. This is in line with a similar trend seen by the general public in the Crime Survey for England and Wales. [2] The number of businesses experiencing an attack in the […]
Read MoreFacebook’s 2FA may be making you less private
As high profile data breaches and leaks continue to hit the headlines, more people are becoming aware of the benefits of two-factor authentication (2FA). This allows you to overcome the weaknesses of relying on just a password by having an authentication code sent to a mobile phone – either as a text or via an […]
Read More