IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

two-factor authentication (2FA)

What is MFA fatigue and how do you defend against attacks?
Desktop monitor and mobile phone with hand pointing
cyber security

What is MFA fatigue and how do you defend against attacks?

Strong authentication is key to security, but it needs to be properly managed to avoid MFA fatigue
30 Dec 2022
Beyond Identity strikes up strategic partnership with World Wide Technology
A close up of a person using a laptop and a smartphone with a virtual password field displayed above the smartphone
cyber security

Beyond Identity strikes up strategic partnership with World Wide Technology

WWT will implement Beyond Identity’s authentication platform internally while also acting as a global channel partner
14 Dec 2022
How to implement strong authentication
Mockup image with padlocks to symbolise a cyber security vulnerability
information security (InfoSec)

How to implement strong authentication

Strong authentication is hugely important, but implementing any regime at scale is not without its challenges
13 Dec 2022
Six cyber security holes you need to plug now
Graphic with hexagonal tiles with a lockpad and one tile with an unlocked lock pad against a red background
cyber security

Six cyber security holes you need to plug now

We shine a light on the easily overlooked cyber cracks that can turn into major sinkholes exposing your business
8 Nov 2022
Microsoft 365 business users targeted with new DocuSign phishing scam
A smartphone with the Microsoft 365 logo displayed, held in front of a blurred Microsoft banner
phishing

Microsoft 365 business users targeted with new DocuSign phishing scam

Threat actors are using fake login forms to trick users into changing their payment details
25 Aug 2022
Cloudflare scuppers Twilio-like cyber attack with hardware keys
The Cloudflare website accessed through a web browser on a PC
cyber security

Cloudflare scuppers Twilio-like cyber attack with hardware keys

Phishing attempt was unable to gather information required to access the company’s systems thanks to secure hardware MFA
11 Aug 2022
Google adds stronger safeguards for Workspace accounts
Google's Workspace suite on a smartphone
collaboration

Google adds stronger safeguards for Workspace accounts

An automatic safety features notify users of risky account actions
11 Aug 2022
How secure is Gmail?
A smartphone on a keyboard showing the Gmail loading screen
Security

How secure is Gmail?

The practical steps you should take to secure your Gmail account, from implementing 2FA to performing regular checkups
23 Jun 2022
IoT privacy and security concerns
A secure network depicted by connected padlocks
Security

IoT privacy and security concerns

We take a look at what's needed to really secure internet-connected devices
6 May 2022
Apple, Google, Microsoft expand their support for password-less sign-ins
A blue fingerprint on a glass surface
cyber security

Apple, Google, Microsoft expand their support for password-less sign-ins

New approach promises to offer “simpler, stronger authentication” across leading platforms to help protect users from malicious activity
6 May 2022
New MFA security standards for online payments come into force
Man holding credit card making online payment on a tablet
two-factor authentication (2FA)

New MFA security standards for online payments come into force

Version 4.0 of PCI DSS also reforms password requirements and broadens its terminology to address other network access controls
31 Mar 2022
Avast to acquire identity services provider SecureKey
The Avast logo on top of an office building in broad daylight
cyber security

Avast to acquire identity services provider SecureKey

The acquisition will add to Avast’s privacy-focused identity product and services portfolio
24 Mar 2022
What is Strong Customer Authentication (SCA) under PSD2?
Online payment
two-factor authentication (2FA)

What is Strong Customer Authentication (SCA) under PSD2?

An in-depth look at the EU directive that aims to harmonise online payment protection
14 Mar 2022
Multi-factor authentication deployment guide
The whitepaper title on a strip of swirling blue and purple diagonal across the pagewhitepaper
Whitepaper

Multi-factor authentication deployment guide

A complete guide to selecting and deploying your MFA authentication guide
7 Mar 2022
NordPass teams up with insurance provider Cowbell Cyber to improve security awareness
A person holding a tablet with the NordPass app displayed
cyber security

NordPass teams up with insurance provider Cowbell Cyber to improve security awareness

Policy holders will be eligible for a 15% discount on NordPass Business
18 Feb 2022
Google claims default 2FA reduced account breaches by 50%
A man using 2FA on his smartphone to access a service on his laptop
two-factor authentication (2FA)

Google claims default 2FA reduced account breaches by 50%

The auto-enabled security mechanism was first introduced late last year
9 Feb 2022
Crypto.com confirms $34 million hack caused by 2FA bypass exploit
A collection of various coins with cryptocurrency logos embedded onto them
cryptocurrencies

Crypto.com confirms $34 million hack caused by 2FA bypass exploit

The cryptocurrency exchange previously denied that any customers lost funds despite numerous reports from customers and analysts
21 Jan 2022
CISA warns organizations to isolate Ukranian traffic
A zoomed in photo of a world map showing Ukraine
cyber security

CISA warns organizations to isolate Ukranian traffic

Security agency tells IT staff to be on alert following cyber attacks on Ukraine
20 Jan 2022
White House issues memorandum to bolster national security systems
US president Joe Biden speaking to press at the White House while sat in front of the US flag
cyber security

White House issues memorandum to bolster national security systems

Agencies must now implement multi-factor authentication within 180 days, along with encryption for data at rest and in transit
20 Jan 2022
How to build a zero trust model
Cyber security represented by a digital screen with encryption data background
Security

How to build a zero trust model

Threats are becoming greater and more diverse, but having a zero trust architecture could help your business defend its infrastructure
11 Jan 2022
Five things to consider before choosing an MFA solution
Image of two-factor authentication in action
Security

Five things to consider before choosing an MFA solution

Because we all should move on from using “password” as a password!
17 Dec 2021
Meta makes 2FA mandatory for high-risk users
A smartphone showing the Meta company logo in front of a large Facebook logo
two-factor authentication (2FA)

Meta makes 2FA mandatory for high-risk users

Journalists and activists must adopt extra protective measure under new rule
3 Dec 2021
Google will auto-enrol 150 million users in 2FA by end of 2021
A woman using Google on laptop and smartphone
two-factor authentication (2FA)

Google will auto-enrol 150 million users in 2FA by end of 2021

An additional two million YouTube creators will also be required to switch it on the 2SV feature by the end of the year
6 Oct 2021