Con’s on Time-based one-time passwords

Con’s on Time-based one-time passwords

TOTP: Three Pro’s and Con’s Time-based one-time passwords can be phished, they are outside your business control to manage, and they are device dependant on a token generator or app on phone. If you’ve been using a dedicated authenticator app such as one...
Website Hacking on the increase

Website Hacking on the increase

Here are the top 6 ways websites get hacked, according to Google Google recently noted that it had seen a 32% rise in hacked website over 2016. Here are the most common tactics it found. In 2016, the number of hacked websites rose by 32%, according to a blog from...
CISO moves to the top

CISO moves to the top

The CISO moves from the basement to the boardroom A growing threat landscape has changed the role of the chief information security officer in the past decade. Here’s why this position and its evolution are vital in the modern enterprise. “With the recent ransom...
Website Hacking on the increase

Website Hacking on the increase

Here are the top 6 ways websites get hacked, according to Google Google recently noted that it had seen a 32% rise in hacked website over 2016. Here are the most common tactics it found. In 2016, the number of hacked websites rose by 32%, according to a blog from...