MFA

MFA Fatigue: A Growing Security Concern

The internet has never faced so much existential risk from people who want to harm companies and their users. While many organisations understand that there’s a link between identity and security, few fully grasp how foundational identity is to a modern security strategy. Organizations with gaps in their identity security are significantly more at…

Okta Passkey Management: A New Feature Flag

Apple recently announced support for Multi Device FIDO credentials - also called passkeys. Passkeys allow users a passwordless login to all of their iOS and macOS devices. Passkeys provide a better user experience across websites and apps, and enhance security by virtue of being a standards-based technology that–unlike passwords–is resistant to…

Why Seamless Customer Experiences Start With Stronger Auth

Customers today are demanding more from your digital platforms. They want safer, faster, and more seamless digital experiences, and they reserve their trust for the brands that can balance that scale between speed and security. In the most recent episode of Okta and Computer Weekly’s Identity Made Easy video podcast series, we explored how…

Are Your Customers Safe from Account Takeovers?

Criminals love customer credentials. It’s driving a surge in account takeover (ATO) attacks, in which hackers exploit stolen usernames and passwords to infiltrate user accounts and steal valuable data. So what can businesses do to mitigate this threat, and protect their customers, finances and reputation? In this episode of Okta and Computer…

What Is Two-Factor Authentication (2FA)? 

Two-factor authentication (2FA) is a form of multi-factor authentication (MFA), and is also known as two-step authentication or two-step verification. 2FA is a security measure that requires end-users to verify their identities through two types of identifiers to gain access to an application, system, or network. Think of your most recent login…

Okta + Proofpoint: Uniting People-Centric Security and Identity to Protect Users Against Phishing

Today’s cyber-attacks target people, not infrastructure. Threats are constantly evolving to target the weakest point in an organisation's attack surface– the end user. In fact, more than 90% of advanced threats target users through email. Not only that, but the growth of remote workers introduces more security risk than ever before as users…

6 Steps to Practice Strong Laptop Security

If you’ve ever found yourself searching security questions like “how to secure my work computer” and “laptop security antivirus,” this article is for you. Here, we answer common company laptop security questions like: How do I keep my laptop secure in a public network? What is the best security system for my computer? Is my laptop password safe?…

What Is Biometric Authentication?

Biometric authentication is a security process that compares a person’s characteristics to a stored set of biometric data in order to grant access to buildings, applications, systems, and more. With cybercrime, fraud, and identity theft on the rise, it’s more important than ever for businesses to help customers and employees verify their identity,…

Archive