Is It Time for a Mac Attack?

After years of successfully dodging the vast majority of viruses, spyware, ransomware and other malware typically directed at PCs, it seems that Mac may be nearing the critical mass necessary to attract cyberthieves. It’s definitely getting closer. According to AppleInsider, “In the fourth quarter of 2016, Apple saw a 4.5 percent increase in shipments…as the wider PC market fell further into the red.” To put it simply, Macs are becoming more popular, and that shouldn’t come as a surprise. Visit your local coffee house and you’ll probably find the vast majority of patrons are sipping their lattes while staring into…

Driving Cloud-Based Agility at Rémy Cointreau with Centrify

Business requirements and information security priorities have always had a tough time aligning. It’s even become something of a cliché these days to say that security is a block on agility, productivity and growth. Yet it doesn’t have to be that way. Rémy Cointreau’s recent collaboration with Centrify is a great example of how, when implemented correctly, security can actually support the business: in this instance, our move to a more agile, cloud-based infrastructure.  On the opening day of Infosecurity Europe in London, I explained to a packed audience exactly how the Centrify Identity Service is helping our employees work…

Infosecurity Europe 2017: Workplace Distraction Is a Major Security Risk, So What Can We Do About It?

From Yahoo to TalkTalk, and Wonga to Kmart, wherever you look today data breaches dominate the headlines. In fact, organisations are urged to assume it’s a case not of “if” but “when” they’re hit, and plan accordingly. The repercussions could be disastrous: a recent Centrify study revealed that on average share prices tumble 5% following a breach, with a third (31%) of customers discontinuing their relationship with the affected firm. But where do these breaches stem from? Human error has long been pegged as a major contributing factor, so we decided to take a snap poll of attendees at Infosecurity…

Time to Ditch Passwords: Taking the Centrify Message to Infosecurity Europe

London Olympia will again be the venue this week as experts from around the world flock to the capital for the annual Infosecurity Europe show. With over 13,000 visitors expected over the three days, this is one of the biggest industry events around. Centrify will be there on Stand C65 to share why we think our range of advanced identity services are the only way IT leaders can secure their hybrid enterprise against modern threats. Attendees also have a great opportunity to hear first-hand from customer Remy Cointreau on the challenges of becoming a more secure and agile organisation through…

Do You Know How Easy It Is to Guess Your Password? (Hint: You Don’t Want to Read This!)

The number of account credentials that has been stolen in the last 10 years has exploded to a degree that is unprecedented. It is now a fait accompli that many of the security tools out there can’t help you as 81% of data breaches come from compromised credentials. Lets delve into how easy it is to break into almost any account. Hackers have invented the digital equivalent of a master key. If you look at sites like SecLists, Weakpass, and Hashes.org —  not to mention berzerk0’s probable wordlists on github which is a clever amalgam of password wordlists. Here you will find…

How Can User Behavior Analytics Kill the Password?

Last time, I wrote about adaptive authentication and briefly touched on behavior analytics being an integral part of adaptive authentication. For true behavior analytics, you need some smart AI powered multi-factor authentication (MFA). Now, if you think about it and put the pieces of the puzzle together you might be able to kill passwords altogether. Wouldn’t that be nice? You no longer need to remember any passwords and all you need is access to one of your MFA tools when authenticating. With the increased use of smart phones and other devices for MFA, businesses now more than ever have the…

Déjà vu! Verizon Reports Compromised Credentials Are (by far) the Leading Cause of Breaches

Another year has gone by and the words from the 2016 Verizon Data Breach Investigations Report (DBIR) still ring true: “We’re not mad, just disappointed.” The 2017 Verizon Data Breach Investigations Report (DBIR) paints a déjà vu portrait of data breaches where 81% of hacking-related breaches leveraged either stolen and/or weak passwords. You have to hand it to cyber criminals, they are no hacks (pun intended). Much like the flow of water, they find the path of least resistance to their target and today that path is clearly straight through your users and their self-managed “simple factor” passwords. Look at…

Don’t Open that Google Doc Link: Another Phishing Scam

Yesterday, Google users were targeted by a spear phishing campaign that some cybersecurity researchers believe to be one of the fastest-spreading attacks of its kind in history. This attack was highly effective, as the phishing emails were harder to spot since they were from familiar senders. Most users were likely easily fooled into trusting a message from a known contact, which made this scam easy to spread and propagate quickly. While the hole was quickly patched by Google, it is always prudent to check the URL of a link before clicking on it to verify it is spelled correctly and…

Am I Affected by the European General Data Protection Regulation?

It’s a year until the biggest shakeup to Europe’s privacy laws in nearly a generation takes effect. The European General Data Protection Regulation (GDPR) will bring sweeping new rules into force, including new consumer rights over how personal data is used, and mandatory 72-hour data breach notifications. Yet there’s still confusion over which companies and what types of data are covered by the law. With firms currently complying with less than 40% of GDPR principles on average, time is running out. That’s why Centrify is running a new monthly blog series designed to raise awareness about the GDPR, as the clock…