Blog Archives

The answer to Shadow IT is at your fingertips

If you haven’t heard of the term Shadow IT yet, you will do soon. Shadow IT is used to describe information-technology systems and solutions built and used inside organisations without explicit organisational approval. It is also used, along with the term … Continue reading

Seven of the Ten Largest Social Networking Sites Now Relying on Two Factor Authentication

In a step to better protect users and reduce fears related to online privacy, two-factor authentication (2FA) has now been employed by seven of the ten largest social networking sites (including Facebook, Twitter and LinkedIn) as their authentication measure of choice. … Continue reading

The Holy Grail of Authentication

With consumers well versed in how to use 2FA and the importance of it to keep their private data safe from prying eyes, the question is why can’t the same be said about the security used by businesses? Surely the … Continue reading

Secure authentication is the only solution to vulnerable public Wi-Fi

Wi-Fi has become a necessity of the digital age, and like everything, everyone loves it even more when it is free. Whether it’s used to access a presentation at a new client meeting, to host a video conference call, or … Continue reading

Adaptive two-factor authentication: is it all it’s cracked up to be?

It’s a given that employee access to corporate systems should be both as secure and simple as possible. Up until recently however, time-strapped CIOs, under pressure from demanding staff and challenged with authenticating users all over the world on multiple … Continue reading

Cyber Insurance: No Longer a Want, but a Need

Cyber insurance is an important element for companies as it covers the damage and liability caused by a hack, which are usually excluded from traditional liability coverage.  Stricter data privacy notification laws, government incentives, cloud adoption and the increase in … Continue reading

Adaptive Two-factor Authentication: An Easy Solution for CIOs?

It’s a given that employee access to corporate systems should be both as secure and simple as possible. However, time-strapped CIOs under pressure from demanding staff and challenged with authenticating users all over the world on multiple devices, have been … Continue reading

Hackers are powerless with zero knowledge 

Every day hackers are being equipped for their next attack, as more and more users are trusting organisations with their personal information online. But with zero knowledge, hackers can be rendered powerless.

SecurEnvoy Launches Free Security Assessment to Combat the Increased Frequency and Severity of Corporate Security Breaches

SecurEnvoy Calls for Government, Healthcare and Financial Services Companies to Strengthen Internal Security with Two-factor Authentication (2FA). SecurEnvoy; the trusted global leader of mobile phone based Tokenless® two-factor authentication (2FA) has launched a unique security assessment for businesses in line with … Continue reading

5 Seconds to Protect Businesses

It is also important to accept that threats come in many forms and can affect businesses greatly, for example, 15 per cent of large organisations suffered from a security or data breach in the last year involving smartphones or tablets. … Continue reading



A world without tokens

Authentication Live Demo

application-demo Try a 2FA Log-In

Free 30 Day Trial

application-demo Get Your Trial

Request a Call Back

Request a Call Back Request a Call Back

Blog

Upcoming Events

To view more details on our events, Click Here

Contact Us

info@SecurEnvoy.com | +44 (0) 845 2600010