Skip to content

Industry News

December 07

Hackable Holidays: Dangers of Toys That Spy on Kids

Smart toys that connect to the internet are at the top of kids’ wish lists this year, but experts say the toys can be used to spy on them and expose children to predators.

Read more
December 01

Uber Paid Hackers $100,000 to Keep Secret a Massive Data Breach In 2016

Data Breach Friday: Uber Technologies Inc paid hackers $100,000 to keep secret a massive breach last year that exposed the data of some 57 million accounts of the ride-service provider, the company said on Tuesday. Could authen2cate's services help prevent future risks?

Read more
November 30

5 Ways Users Circumvent Security Measures and How to Prevent It

Workers usually choose convenience over security, especially if you force them to jump through too many hoops. But there are steps you can take to shift the balance back in security's favor.

Read more
November 22

How To Give Your Parents The Security Talk This Thanksgiving

Explaining why you shouldn't use the same password for every account can be difficult. Here's some help.

Read more
November 13

Privileged Account Management Remains Problematic

A new survey finds that 86% of security pros do not consistently change privileged account passwords, and 40% of respondents don't change default admin passwords! A proper IAM solution like Authen2cate's is essential to safeguarding these critical accounts.

Read more
November 10

Jaywing Suffers Data Breach Affecting CollectPlus, Vodafone, and Other Clients

Data Breach Friday: It appears little personal information was obtained, but internal documents and other info for UK firm Jaywing's clients were publicly accessible on its intranet for over a month! Perhaps this could have been avoided if 2-Factor Authentication was required for access...

Read more
November 09

Senators Push to Ditch Social Security Numbers in Light of Equifax Hack

With over 140 million Social Security numbers compromised in the Equifax hack, clearly the SSN is too vulnerable to continue using as a primary factor of identity management. Authen2cate applauds the discussion around adopting a more secure, digital system with multi-factor authentication features.

Read more
November 03

AMP Among Companies Affected by Data Breach of 50,000 Staff Records

Data Breach Friday: Over 50,000 staff records from Australian companies and government agencies were found on an improperly secured AWS server. It included out of date credit card data, but also contact information that could still be used in phishing or social engineering attacks!

Read more
November 01

IoT Security Fail: Hacked Vacuum Cleaner Becomes Spy Cam

After bypassing many of the LG Hom-Bot vacuum's security features, researchers were able to simply change their usernames to gain access to the device's camera and live-stream video! IAM and IoT must go hand-in-hand!

Read more
October 27

Biggest Ever SA Data Breach: 60 Million ID Numbers Leaked on Real Estate Server

Data Breach Friday goes international: ID numbers and other personal info of 60 million South Africans was found easily available on a real estate company's servers! Did they really need to store this info? And why didn't they have the Identity & Access Management measures in place to adequately protect it?

Read more
October 23

Malware Hidden in Vid App Is So Nasty, Victims Should Wipe Their Macs

Hackers gained access to Eltima Software's development servers and were able to inject a particularly sinister malware targeting Macs. Were those servers secured with 2-Factor Authentication?

Read more
October 18

6 Musts When Selecting an A+ Identity and Access Management Solution

An IAM solution for the education space must have single sign-on, easy user provisioning, self-service options, and more. Check out a2c's offerings for education so you can get a better solution in place before the next semester begins!

Read more
October 13

Hyatt Suffers Second Card Data Breach in Two Years

Data Breach Friday: Customer payment information from 41 Hyatt locations has been compromised via "malicious software code." Could 2-Factor Authentication have secured the affected systems and prevented the attack?

Read more
October 11

What Is IDaaS, and Why Does Your Mobile Strategy Need It?

Incorporating Identity-as-a-Service in your BYOD plan can enforce password policies, implement control over remote access of your systems, and introduce context-aware security techniques for improved detection of unauthorized activity. Let a2c be your provider!

Read more
October 06

Yahoo Data Breach Found to Affect All 3 Billion Users

Data Breach Friday: It's been revealed that ALL 3 billion Yahoo accounts that existed in 2013 were compromised in the data breach revealed last December! In addition to updating your password, be sure to enable 2-Factor Authentication wherever possible to protect your accounts!

Read more
September 29

Deloitte Suffers Major Data Breach Without Multi-Factor Authentication

Data Breach Friday: Hackers gained access to a Deloitte admin account that did not have 2-Factor Authentication enabled! For months they had access to usernames, passwords, client emails, and more!

Read more
September 28

Nearly 50% of Organizations Willing to Pay Extra for Security Guarantee from Cloud Vendors

Despite moving to the cloud for cost savings, most companies are willing to pay extra for certain improvements to their service, a 451 Research report found.

Read more
September 22

SEC Admits Data Breach, Suggests Illicit Trading Was Key

Data Breach Friday: The SEC has admitted that a database was compromised last year, and the hackers likely used its business info to conduct illegal stock market trades. Are your crucial databases protected by 2-Factor Authentication?

Read more
September 15

How Much Will the Data Breach Cost Equifax?

Data Breach Friday: The Equifax breach is so massive that the true costs might not be known for weeks, or even months! Can YOU afford all the direct and indirect costs of a data breach? Lock down your customers' or your internal accounts with IAM protection today!

Read more
September 13

3 Security Investments Hospitals Should Make Right Now

Health and Human Services chief information security officer Christopher Wlasich said there are three steps that hospitals should be taking today to bolster their security posture: join forces, treat your patching report like your profit-and-loss report and, at the very least, consider multi-factor authentication.

Read more
September 07

Credit Reporting Firm Equifax Says Data Breach Could Potentially Affect 143 Million US Consumers

Data Breach Friday: In addition to personal information, the breach exposed 209,000 credit card numbers and 182,000 dispute documents with more identifying information! This is all information that criminals could easily use in phishing or social engineering attacks targeting accounts without 2-Factor Authentication!

Read more
September 07

Researchers Reverse 320 Million Hashed Passwords

CynoSure Prime, a “password research collective,” has reversed the hashes of nearly 320 million hashed passwords provided by security researcher Troy Hunt through the Pwned Passwords searchable online database.

Read more
September 01

More Than 711 Million Email Addresses Exposed in Huge Data Breach

Data Breach Friday: A trove of over 700 million email addresses with 80 million valid passwords was found online, with connections to major known data breaches like the LinkedIn and MySpace incidents! Without 2-Factor Authentication, these accounts are prime targets for phishing and other attacks!

Read more
August 25

PlayStation Suffers Social Media Hack, Possible Data Breach

Data Breach Friday: PlayStation's social media accounts were breached by white-hat hackers! It's unclear what other data they may have accessed, but 2-Factor Authentication from a2c could have easily prevented the Twitter hack!

Read more
August 18

Info on 1.8M Chicago Voters Was Publicly Accessible, but Now Removed from Cloud Service

Data Breach Friday: Names, addresses, birth dates, partial SSNs, and drivers license numbers of 1.8 million Chicago voters were publicly accessible on an AWS server managed by a third-party contractor. This type of info could lead to successful phishing & social engineering attacks that would compromise accounts not protected with 2-Factor Authentication!

Read more
August 17

Most Small to Mid-Sized Organizations Don't Use Multi-Factor Authentication

While only 38 percent of large organizations don't use multi-factor authentication to protect user accounts, 62 percent of small to mid-sized organizations do not use MFA, a recent KnowBe4 survey of 2,600 IT professionals found.

Read more
August 11

Indian Creditseva Data Breach

Data Breach Friday: Today we go international: Indian credit services firm Creditseva exposed sensitive information of 48,000 people because an AWS server was publicly accessible.

Read more
August 09

Why It Pays to Center Your Digital Transformation Strategy on Identity

Employees and customers must be able to access applications and data from multiple devices and locations, without compromising security.

Read more
August 03

HBO Data Breach Included Thousands of Internal Documents

Data Breach Friday: Hackers stole 1.5 TB of documents and unaired episodes from HBO, and also got hold of an executive's credentials for some online services! Hopefully HBO will require password changes and 2-Factor Authentication where possible...

Read more
August 01

Hackers Show Proofs of Concept to Beat Hardware-Based 2FA

DEF CON hackers show how YubiKeys and RSA tokens can be spoofed and circumvented.

Read more
July 27

Swedish Ministers Resign Amid Data Security Breach Scandal

Data Breach Friday: Swedish citizens’ sensitive personal information may have been leaked in a breach so severe that two government ministers have resigned!

Read more
July 20

Data Breach Friday: Over 5 Million Social Security Numbers Exposed in Kansas Breach

A breach of a Kansas Department of Commerce system exposed more than 5 million Social Security numbers to hackers, according to a report from a local news outlet.

Read more
July 18

Launch Your Own Cybersecurity Sprint: 30 Days to Improved Security

Whether it’s well-publicized cyber attacks on government organizations or widespread ransomware that threatens to halt business operations, attackers continue to target privileged credentials as a quick and easy means to reach critical assets and steal sensitive data.

Read more
July 13

Security Experts Warn of Account Risks after Verizon Customer Data Leak

Thought your email, social media, and bank accounts were safe with two-factor authentication? Think again: your phone account will likely be the biggest point of security failure in your life today.

Read more
July 05

Three Million WWE Fan Accounts Exposed Online

Data Breach Friday: Unsecured AWS server hosts fans' names, addresses, and birth dates

Read more
June 28

Anthem to Pay Record $115 Million to Settle U.S. Lawsuits over Data Breach

Data Breach Friday: Remember the Anthem data breach that affected 79 million people in 2015? A tentative settlement of $115 million has been reached--the largest settlement for a data breach ever! Still think better Identity & Access Management isn't worth it?

Read more
June 27

UK Parliament Cyberattack Highlights the Shortcomings of Passwords

Over the weekend, the UK parliament's email system was subject to a brute force attack using passwords stolen in the 2012 LinkedIn breach.

Read more
May 23

The CIO's Business Case For IAM

As the CIO, you must see the big picture when it comes to implementing technology in your organization. It is not good enough to look at how a technology addresses a single issue; the CIO must evaluate how a technology will both positively and negatively impact the entire company.

Read more
May 22

The CFO's Business Case For IAM

As the CFO, you are faced with the challenge of justifying technology purchases based on some combination of necessity, functionality, cost savings, benefits, and the overall ROI.

Read more
May 22

Securing Identity In K-12 Education

Authen2cate solves for challenges like large user bases, too many passwords, many mobile devices and increasing security costs with our K-12 solutions.

Read more
May 19

Single Sign-On

Authen2cate provides a secure, scalable, and highly available Identity and Access Management (IAM) platform that allows any organization to quickly and securely implement SSO, 2-Factor Authentication, and Automated Provisioning.

Read more
May 19

Multi-Factor Authentication

Multi-Factor Authentication enables your users to secure their logins and transactions via text, email, smartphone application, or phone calls.

Read more
May 19

IAM for Any Industry: Health Care

In addition to the standard security and efficiency concerns that any organization faces with their internal network and IT processes and procedures, those within the medical field face heightened scrutiny due to the stringent regulations imposed on patient record access through HIPAA.

Read more
May 18

Cloud Security 101

As cloud computing continues to grow, enterprises are relying more and more on outside providers of Software-as-a-Service (SaaS) and Infrastructure-as-a-Service (IaaS) for the applications they provide, and they are also allowing cloud providers to take over hosting both company data and on-premises applications.

Read more
May 18

A2C Mobile Overview

A2C Mobile is the most secure way to do 2-Factor Authentication, and also the most cost-effective. By leveraging your employees’ devices (BYOD), you can secure access to your applications for far less than traditional methods.

Read more
May 17

Case Study: The Royal Marsden

Authen2cate’s seamless completion of these challenging and time-consuming tasks allows The Royal Marsden’s dedicated IT staff to focus on other aspects of CMC.

Read more
May 17

Case Study: LRW

“LRW needed to integrate applications not included by many self-service SSO providers. Additionally, they did not have the necessary resources, expertise, or experience to implement this complex setup on their own.”

Read more
May 15

Directory Services

Authen2cate provides a number of directory-related services to meet our clients’ needs. We can act as the primary directory in the cloud for all your enabled applications or leverage your internal directory (LDAP or AD) as the primary source for user identities.

Read more
April 24

IAM for Any Industry: Education

The education field has several unique challenges when it comes to identity and access management (IAM) for the many applications their students and faculty use every day. But there are several ways in which different IAM technologies and methods can solve these challenges and make a more secure and convenient system!

Read more