All You Need to Know About 2-Factor Authentication

Two-factor authentication (also known as 2FA) is an additional security layer for your business – helping to address the vulnerabilities of a standard password-only approach. It is a method of confirming users' claimed identities by using a combination of two different factors: 1) something they know, 2) something they have, or 3) something they are. … Continue reading All You Need to Know About 2-Factor Authentication

Data Breach

Data and security breaches and how to stay safe online.

Over the last few years, data breaches have grown in both frequency and severity. According to Gemalto, data breaches compromised 4.5 billion records in only the first half of 2018. The most recent of these high-profile scandals is the Marriott data breach, where hackers stole private details from around 500 million customers. These details include … Continue reading Data and security breaches and how to stay safe online.

3 Innovations that Will Impact Cyber Security

HARDWARE AUTHENTICATION The inadequacies of usernames and passwords are well known. Clearly, a more secure form of authentication is needed. One method is to bake authentication into a user's hardware. Intel is moving in that direction with the Authenticate solution in its new, sixth-generation Core vPro processor. It can combine a variety of hardware-enhanced factors … Continue reading 3 Innovations that Will Impact Cyber Security

How Cloud Technology Can Help You Grow Your Small Business…

The rate at which technology has grown in recent time has had a huge influence on the world of business. One of the most recent and largest transformation advancing small business owners, is the growth of cloud technologies. Gradually, the days of having to copy documents onto floppy disks, thumb drives and CDs/DVDs or having … Continue reading How Cloud Technology Can Help You Grow Your Small Business…