Two-Factor vs. Multi-Factor Authentication: A Stark Difference

If there’s one thing you should remember from geometry class in 7th grade, it’s the fact that every square is a rectangle, but not every rectangle is a square. The criteria defining one object doesn’t encompass the criteria for the second object in all situations. This is the same problem we face when talking about two-factor and multi-factor authentication. Because both sound similar, it’s a common fallacy for security providers to advertise that their products have “multi-factor authentication.”

Continue reading “Two-Factor vs. Multi-Factor Authentication: A Stark Difference”

Methods People Use To Grab Your Data And Steal Your Identity – Part II

In part one, we’ve discussed some common methods that hackers use to get your credentials or otherwise steal your data. Unfortunately, there’s no way to cover absolutely everything, but we still can discuss other common methods. Today, we’re going to cover some more attack methods and how to prevent them, if at all possible. We’ll continue the previous discussion, adding more newer methods of cracking credentials and stealing identities.

Continue reading “Methods People Use To Grab Your Data And Steal Your Identity – Part II”

A Brief Explanation Of Cloud Computing For Small Businesses

So, you’re hearing all this hype about the “cloud.” Everyone’s talking about it, but seldom do they know what they’re really referring to. Now, this new “cloud” term is being slapped on everything; even things that aren’t really “cloud-based.” How can you distinguish between the cloud and regular online services?

Continue reading “A Brief Explanation Of Cloud Computing For Small Businesses”

Why Mobile devices/BYOD can create security risks for SMB’s?

With the increasing use of Software-as-a-Service or Cloud apps for business, the Bring-your-own-Device (BYOD) trend among Small and Medium-sized Businesses(SMBs) is increasing. Many employees prefer to use theirown mobile device for work rather than carry around two or more devices. Nowadays, more and more people are working from home and/or telecommuting. Moreover, there is a perception that 24/7 access to email and other company business applications outside working hours helps increase productivity and performance.

Continue reading “Why Mobile devices/BYOD can create security risks for SMB’s?”