Why You Should Ditch SMS as an Auth Factor

In my previous post, I talked about how the COVID19 pandemic has impacted how our customers use MFA — more specifically how SMS authentication is on the rise as organizations look to rapidly roll out a quick and easy secondary auth method in response to the need to embrace remote work. In this post, I’ll go into more detail around issues with SMS…

MFA Trends: The Impact of COVID19

The COVID pandemic has changed how we do many things. In the workplace, it’s pushed us to take a deeper look at how we enable employees to work remotely—and to ensure that they can do it securely. But what does that actually look like? According to our recent Businesses @ Work (from Home) report, companies are adapting and evolving quickly…

How to Secure Your Workforce’s Devices with Okta

Beyond social and economic disruption, the COVID-19 pandemic has shone a light on the fact that if they want to operate safely, businesses need to be able to secure the various access points to their resources—and that includes devices. All over the world, we’re seeing people make workspaces out of living rooms, bedrooms, and outdoor decks. And…

Mobile Device Security: 4 Challenges to Overcome

Today’s workforce looks increasingly like a constellation: various individual endpoints connect together to deliver on a company’s objectives. And that constellation is always growing—users have transitioned away from operating solely on corporate devices. Today, work involves being able to access resources and applications from the comfort of…

How BYOD Impacts Device Security

Today’s employees want to — and in many cases today, have to — be productive and available from anywhere at any time. More than ever, teams need to communicate and collaborate from different locations through a variety of channels, devices, and networks. In order to address this need, companies are starting to think harder about clear Bring Your…

Securing Office 365 in 3 Easy Steps

Five months is a long time in the business world—never mind five years. That’s why it’s so impressive that Microsoft’s Office 365 has consistently ranked as the #1 application in our Businesses @ Work Report. It’s now 2020, and Office 365 is still the most popular workplace app by a large margin. Unfortunately, that success doesn’t come without…

What is Phishing?

In today’s increasingly digital environment, employees and contractors can sign into workplace applications and systems from anywhere with a simple set of credentials. And while this might make things easier for employees and contractors alike, it also puts organizations at heightened risk of a specific form of cybercrime: phishing. Designed to…

AI Is Changing Security—Here’s How

Cybercriminals have evolved from lone hackers targeting small websites and systems into dangerous entities launching large-scale cyberattacks that affect millions of people worldwide. In recent years, we’ve seen multiple huge ransomware attacks like WannaCry and NotPetya cause hudereds of millions or even billions of dollars in damages and lost…

Empower Employees to Become First Responders with UserInsight

As cybercriminals become more refined in their quest to access workforce credentials, today’s businesses are under ever-increasing pressure to implement systems, tools, and processes that protect their sensitive data. These features need to be able to secure their employees without overburdening IT with excessive monitoring tasks. This is a tricky…