-
What Is Phishing-Resistant MFA?
- February 24, 2023
- Posted by: admin
- Category: MFA
No CommentsIs there a phishing-resistant MFA or does MFA work well enough to be a viable defense against phishing attacks? MFA comes in many forms. And some of these are more susceptible to MFA bypass attacks than others. Understand which types of MFA count as phishing-resistant MFA.
-
2FA for Windows & RDP Logins
- September 14, 2020
- Posted by: admin
- Category: 2FA for Windows
Two-factor authentication (2FA for Windows & RDP logins) with UserLock makes securing access to your Windows environment intuitive and easy. Get the best of both worlds – a secure network and a productive workforce. 12 Reasons to choose 2FA for Windows using UserLock 1) Deploy 2FA alongside Active Directory:- Simple to implement and intuitive to
-
IT Security in higher education – spotting the attacker
- April 22, 2018
- Posted by: admin
- Category: IT Security
It’s already a given that spotting an attacker is difficult in IT Security – they use compromised credentials to access any and all data available to that account. This means that the attacker is simply accessing whatever data the user was already given access to. So, how are you supposed to spot inappropriate access when
-
Managing access to personal data for GDPR compliance
- April 4, 2018
- Posted by: admin
- Category: IT Security
The European Union is touting the General Data Protection Regulation (GDPR) as the most important change in data privacy regulation in 20 years. From the 25th May 2018, all businesses that process and control personal data within the EU will need to comply with the GDPR or face massive fines. Non-compliance will either result in