Advanced FiltersClear Filter
Star Rating
Categories
The Ultimate Guide to Passwordless Authentication

The Ultimate Guide to Passwordless Authentication

You have business accounts, therefore you have usernames and passwords...for now.
by Merry Marwig, CIPP/US
Two-Factor Authentication

Two-Factor Authentication

What is two-factor authentication? Two-factor authentication—commonly referred to as 2FA, two-step verification, 2-step verification, or dual-factor authentication—is a security procedure that requires account users to verify their identity in two different ways prior to granting them access to user accounts. This process is a form of multi-factor authentication requiring exactly two forms of the five commonly accepted authentication factors. Many companies utilize multi-factor authentication (MFA) software to achieve this. 
by Merry Marwig, CIPP/US
What Is a Data Breach? How to Prevent It and Best Practices

What Is a Data Breach? How to Prevent It and Best Practices

In the online realm, your personal and professional data can sometimes be the life of the party, even when you didn't send the invites!
by Sagar Joshi
Two-Factor Authentication: A Valuable Addition to Account Security

Two-Factor Authentication: A Valuable Addition to Account Security

Humans are predictable. Sometimes, so are their passwords.
by Sagar Joshi
2020 Privacy and Security Trends

2020 Privacy and Security Trends

This post is one part of G2's 2020 digital trends series. Read more about G2’s approach to digital transformation trends in an introduction from Michael Fauscette, G2's chief research officer.
by Merry Marwig, CIPP/US
How FIDO Standards Make Authentication Simple and Secure

How FIDO Standards Make Authentication Simple and Secure

Fast identity online (FIDO) standards are authentication protocols where security and user experience meet.
by Sagar Joshi
Combatting the Rising Threat of COVID-19 Email Scams

Combatting the Rising Threat of COVID-19 Email Scams

The coronavirus has impacted several countries across the world, forcing businesses to adapt to new ways of getting work done. For many businesses, this means supporting a suddenly remote workforce.
by Merry Marwig, CIPP/US
Don’t Fall Prey to Spear Phishing: Protect Yourself Now

Don’t Fall Prey to Spear Phishing: Protect Yourself Now

Everyone wants to keep their information safe.
by Alexa Drake
What is Multi-Factor Authentication (MFA)? Types and Benefits

What is Multi-Factor Authentication (MFA)? Types and Benefits

Consider how much of your life takes place on a computer or a mobile device.
by Alexa Drake
13 Cyber Security Tips From the Experts

13 Cyber Security Tips From the Experts

If you’ve never had your identity stolen or your computer hacked, consider yourself one of the lucky ones.
by Mara Calvello