Select Page
Protect Your Critical Data with 2FA and Beyond

Protect Your Critical Data with 2FA and Beyond

A substantial increase in the number of recent data breaches highlights the vulnerability of passwords, as compromised passwords are used in the vast majority of such breaches. Many organizations are adopting traditional two-factor authentication (2FA) methods, such...
If Identity Fraud Occurs Every 2 Seconds, How Do You Stop It?

If Identity Fraud Occurs Every 2 Seconds, How Do You Stop It?

By Jeff Harris, 12/16/2014 In October 2014, President Obama signed a new Executive Order requiring all agencies that provide online access to personal data to use multiple methods of authentication, including identity proofing. He gave them an 18-month deadline for...