Category Archives: Opinion

The answer to Shadow IT is at your fingertips

If you haven’t heard of the term Shadow IT yet, you will do soon. Shadow IT is used to describe information-technology systems and solutions built and used inside organisations without explicit organisational approval. It is also used, along with the term … Continue reading

The Holy Grail of Authentication

With consumers well versed in how to use 2FA and the importance of it to keep their private data safe from prying eyes, the question is why can’t the same be said about the security used by businesses? Surely the … Continue reading

Secure authentication is the only solution to vulnerable public Wi-Fi

Wi-Fi has become a necessity of the digital age, and like everything, everyone loves it even more when it is free. Whether it’s used to access a presentation at a new client meeting, to host a video conference call, or … Continue reading

Adaptive two-factor authentication: is it all it’s cracked up to be?

It’s a given that employee access to corporate systems should be both as secure and simple as possible. Up until recently however, time-strapped CIOs, under pressure from demanding staff and challenged with authenticating users all over the world on multiple … Continue reading

Adaptive Two-factor Authentication: An Easy Solution for CIOs?

It’s a given that employee access to corporate systems should be both as secure and simple as possible. However, time-strapped CIOs under pressure from demanding staff and challenged with authenticating users all over the world on multiple devices, have been … Continue reading

Hackers are powerless with zero knowledge 

Every day hackers are being equipped for their next attack, as more and more users are trusting organisations with their personal information online. But with zero knowledge, hackers can be rendered powerless.

5 Seconds to Protect Businesses

It is also important to accept that threats come in many forms and can affect businesses greatly, for example, 15 per cent of large organisations suffered from a security or data breach in the last year involving smartphones or tablets. … Continue reading

The rising cost of data breaches brings the birth of the authentication blueprint

Once only considered for high-end companies (e.g., banks), today companies large and small in the government, healthcare, energy, financial services, insurance, manufacturing, marketing, retail, telecommunications, charity, legal and construction sectors are turning to two-factor authentication (2FA) for their internal security … Continue reading

Can Eyeprint ‘selfies’ replace hardware tokens?

Eyeprints – of veins in the white, not the iris of an eye – captured via selfie are another biometric option for 2-factor security, but concerns about the implications of compromise remain. Andy Kemshall, co-founder and technical director at SecurEnvoy, … Continue reading

Why Your Employees Need To Be In Control In A Mobile World

It makes sense to put employees in control in a world where almost everyone possesses a mobile device. By empowering staff to protect their endpoints, giving them the ability to authenticate their way on their own phone or tablets, IT … Continue reading