Blog Archives

one tap, one swipe; the key to keeping your secrets

Keeping secrets secure has been an issue since early Inuit’s kept information from one  tribe to another, so this isn’t a new phenomenon. What has changed is it’s no longer if data can be kept secret, it’s a question of … Continue reading

Is adaptive authentication really adapting to users or just adding complexity?

German IT Security authority ‘all-about-security’ interviewed Fabian Guter, SecurEnvoy’s EMEA Manager to understand more about the tokenless proposition. Click here for the Voice Interview. In a podcast-style presentation he is asking critical questions to his guests. In this interview, he … Continue reading

Cut your security risk by 45% – with a smart phone

Cybercrime is big news with those behind it often painted as geniuses carrying out complex and difficult tasks from their terminals in ill-lit rooms.But in real life, hacking is much more mundane –  more akin to the burglar who walks down … Continue reading

The answer to Shadow IT is at your fingertips

If you haven’t heard of the term Shadow IT yet, you will do soon. Shadow IT is used to describe information-technology systems and solutions built and used inside organisations without explicit organisational approval. It is also used, along with the term … Continue reading

Seven of the Ten Largest Social Networking Sites Now Relying on Two Factor Authentication

In a step to better protect users and reduce fears related to online privacy, two-factor authentication (2FA) has now been employed by seven of the ten largest social networking sites (including Facebook, Twitter and LinkedIn) as their authentication measure of choice. … Continue reading

The Holy Grail of Authentication

With consumers well versed in how to use 2FA and the importance of it to keep their private data safe from prying eyes, the question is why can’t the same be said about the security used by businesses? Surely the … Continue reading

Secure authentication is the only solution to vulnerable public Wi-Fi

Wi-Fi has become a necessity of the digital age, and like everything, everyone loves it even more when it is free. Whether it’s used to access a presentation at a new client meeting, to host a video conference call, or … Continue reading

Adaptive two-factor authentication: is it all it’s cracked up to be?

It’s a given that employee access to corporate systems should be both as secure and simple as possible. Up until recently however, time-strapped CIOs, under pressure from demanding staff and challenged with authenticating users all over the world on multiple … Continue reading

Cyber Insurance: No Longer a Want, but a Need

Cyber insurance is an important element for companies as it covers the damage and liability caused by a hack, which are usually excluded from traditional liability coverage.  Stricter data privacy notification laws, government incentives, cloud adoption and the increase in … Continue reading

Adaptive Two-factor Authentication: An Easy Solution for CIOs?

It’s a given that employee access to corporate systems should be both as secure and simple as possible. However, time-strapped CIOs under pressure from demanding staff and challenged with authenticating users all over the world on multiple devices, have been … Continue reading



A world without tokens

Blog

Upcoming Events

To view more details on our events, Click Here

Contact Us

info@SecurEnvoy.com | +44 (0) 845 2600010