Category Archives: Uncategorized
“Microsoft’s acquisition of US-based PhoneFactor cements the role of Tokenless® two-factor authentication in securing access to applications, websites and sensitive data. “Tokenless two-factor authentication uses a phone (normally a mobile but sometimes also a desk phone) to provide the second … Continue reading
About two thirds of organizations moving data to the cloud have little or no knowledge about what measures their providers have put in place to protect data, a recent survey found. It was observed however, “Whether your data is on … Continue reading
Forty two percent of IT professionals believe that the average kid could crack most end-user’s passwords using social networking tools. That’s the findings of a survey released today which was conducted by SecurEnvoy amongst 300 IT professionals who found that … Continue reading
A staggering fact that companies that use hardware tokens are not only cheating the employee from convenience, they are also missing the reduction in deployment costs by more than 90%! Tokens that need replacing or that require attention from changing … Continue reading
The news that tokens can be broken in less than 15 minutes raises questions again following last years security breaches! One clients comments related to the need that the traditional token vendors sell the tokens with a life span but generates … Continue reading
The idea that regular password changes lead to better security dates back to the days when passwords were stored in plain text files on Unix systems. Regular password changes actually decrease security, for a few reasons: 1) your poor users … Continue reading
SecurEnvoy is delighted today to confirm that it has successfully patented its ‘preload’ technology for SecurAccess and SecurMail. This sanction ensures other organisations cannot ‘copy’ its pioneering solution for reliable, business grade, tokenless two factor authentication (2FA).
Which is more secure: hardware or software authentication? And which should you choose to prevent becoming the next victim of a breach?
The recent events involving the mobile phone hacking actions of News of the World journalists — and quite possibly many others — have highlighted the fact that there are insecurities in the world of mobile telephones. And with approaching five … Continue reading
The recent events involving the mobile phone hacking actions of News of the World journalists – and quite possibly many others – have highlighted the fact that there are insecurities in the world of mobile telephony. And with approaching five … Continue reading
This latest version of SecurAccess Version 6.0 provides a one-time passcode on the user’s mobile by downloading a soft token as an app for those users that need the extra security in areas that can’t rely on GSM coverage. This … Continue reading