Remove Authentication Remove Examples Remove Firewall
article thumbnail

Are Your Firewalls and VPNs the Weakest Link in Your Security Stack?

Network World

It’s the opposite of a firewall and VPN architecture, where once on the corporate network everyone and everything is trusted. Recent critical vulnerabilities in VPNs and firewalls have exposed the risks associated with perimeter-based security measures. In today’s digital age, cybersecurity is no longer an option but a necessity.

Firewall 135
article thumbnail

Overcoming the Equation: Security = Friction

CTOvision

We’re not done yet, though – badges for physical access, PKI, USB keys, SmartCards, soft certs, biometrics, Network Access Control, firewalls, IPS/IDS, SIEM … I could go on and on. A telling example is the Department of Defense and its approach to mobile security. Userids and passwords are almost free.

Security 249
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Fountainhead: The End of the Laptop-Centric World?

Fountainhead

Let me give you a hypothetical example - but based very much in reality ( names have been changed to protect the innocent ). She shares these folders with her co-workers as well as client contacts within each company (and who are behind each clients firewall) as interactive project-based workspaces. Act I: The Setup.

article thumbnail

CIOs Want To Know: How Secure Is Your Mobile Phone?

The Accidental Successful CIO

I have an excellent example for you to ponder. Should mobile phone users be concerned about relying on their mobile phones for text messaging based two-factor authentication? What this means on a daily basis is that you are probably installing firewalls and creating white lists for who can access what applications and servers.

Mobile 246
article thumbnail

Using Multi-factor Authentication (MFA) | Roadmap to Securing Your Infrastructure

Linux Academy

I’m sure most everyone is familiar with the concept of passphrases, which is the use of a phrase instead of a single password — for example, “The moon is made of ch33se!” It also provides a handy browser plugin to fill in credentials for me, once I’ve authenticated to the plugin. Multi-factor authentication (MFA).

article thumbnail

The changing face of cybersecurity threats in 2023

CIO Business Intelligence

Using the “same old” low-skill tactics, common tools, and a bit of social engineering, hackers can get around complex security policies such as multi-factor authentication (MFA) and identity and access management (IAM) systems. However, scammers might add a sense of urgency saying the offer expires in 2 hours, for example.

Network 140
article thumbnail

How to Pick the Right Technology to Enable the Remote Workforce

CIO Business Intelligence

Protecting data and monitoring user behavior used to be relatively simple when everyone was behind the corporate firewall. For example, more people now need access to sensitive business data while working from home, on public computers, and via their mobile devices. Lock the front door. You practically need a Ph.D.

How To 98