Multi-Factor Authentication

Your end users already carry multiple devices. Why not put them to use? That’s the thought behind multi-factor authentication (MFA), a solution leveraging multiple devices and factors to provide extra security: texting an authentication code to a user’s smartphone, for instance. Here’s what Okta has to say about this innovative authentication method.

MFA Fatigue: A Growing Security Concern

The internet has never faced so much existential risk from people who want to harm companies and their users. While many organisations understand that there’s a link between identity and security, few fully grasp how foundational identity is to a modern security strategy. Organizations with gaps in their identity security are significantly more at…

Okta Passkey Management: A New Feature Flag

Apple recently announced support for Multi Device FIDO credentials - also called passkeys. Passkeys allow users a passwordless login to all of their iOS and macOS devices. Passkeys provide a better user experience across websites and apps, and enhance security by virtue of being a standards-based technology that–unlike passwords–is resistant to…

What Is Two-Factor Authentication (2FA)? 

Two-factor authentication (2FA) is a form of multi-factor authentication (MFA), and is also known as two-step authentication or two-step verification. 2FA is a security measure that requires end-users to verify their identities through two types of identifiers to gain access to an application, system, or network. Think of your most recent login…

Two-Factor Authentication vs. Multi-Factor Authentication: What Are the Risks?

Being authentic is a high term of praise—if we think people are authentic, we believe them to be trustworthy, loyal, and dependable. There's a similar concept in computer security. Business networks are crucial to protect, so firms want only authorised people accessing them. In cybersecurity, authentication means verifying that a person or device…

“We wanted to help more organisations succeed.” Leon Oud shares the vision behind FuseLogic, Okta’s most certified partner in the Benelux

IT leaders know that the best and most up-to-date technologies can make a sizeable impact on their business results. But being on the cutting edge brings its own challenges: from creating and changing users in a wide array of applications, to ensuring the security of apps they may not have full control over – particularly when, confronted with…

What if… You Didn’t Lose Sleep Over Remote Work Security?

When COVID-19 arrived in March, organisations were forced to make quick decisions around remote work security. While those early security measures may have worked well as a stopgap, some companies are discovering those solutions won’t work long-term. Other companies are shifting towards a dynamic work model—a transformation that comes with…

What Is SMS Authentication and Is It Secure?

SMS authentication—also known as SMS-based two-factor authentication (2FA) and SMS one-time password (OTP)—allows users to verify their identities with a code that is sent to them via text message. A form of two-factor authentication, it often acts as a second verifier for users to gain access to a network, system, or application, and is a good…

What is Zero Trust Security?

Zero Trust security is a new strategy for keeping enterprise data secure, rooted in the idea that you can no longer rely on the network perimeter to assess trust. In a Zero Trust model, people are the new perimeter, and identity is the core of maintaining a secure environment. An evolving landscape Historically, organisations have kept their data…

6 Steps to Practice Strong Laptop Security

If you’ve ever found yourself searching security questions like “how to secure my work computer” and “laptop security antivirus,” this article is for you. Here, we answer common company laptop security questions like: How do I keep my laptop secure in a public network? What is the best security system for my computer? Is my laptop password safe?…

Archive