If you can believe it, 2013 is already halfway over. With summer here, businesses everywhere are feeling the heat in their IT organizations – as they fight a growing array of security concerns, threatening their profitability and reputation alike.
$45 million ATM heist turns focus again on insider threats, controlling privileged access!
New wave of cyber-attacks on banks lend credence to the belief that insider threat is getting complex and cyber-criminals are increasingly targeting to siphon-off the login credentials of employees and administrative passwords of IT resources. It is termed as the ‘massive 21 st century bank heist’. A worldwide gang of cyber-criminals in multiple cities drained ATMs to the tune of $45 million in a matter of few hours last week
AP Twitter account hack: Social media proves to be the most convenient platform for hackers!
Just a couple of weeks ago, we published this blog “ Beware! Your social media password could let your business down ! ” and now comes the shocking news about the hack AP’s Twitter account, which created a big embarrassment to the world’s largest and most trusted news cooperative, besides causing panic waves in the Wall Street. The overwhelming popularity of social media attracts the attention of cyber-criminals, who are looking for easy ways to harvest online identities. In fact, the job of cyber-criminals has become a lot easier in this ‘social media era’.
Beware, your social media password could let your business down!
Social Media emerges the most convenient platform for cyber-criminals; Using same password across social media and business applications makes your business vulnerable to attacks! Over 12 per cent of the world population is on social network and the number keeps growing exponentially. Those who do not own an account in Facebook or Twitter are now being viewed as those living in prehistoric times. No doubt, social media is wonderful in helping you stay connected with friends, but the sheer popularity of social media attracts the attention of cyber-criminals looking for ways to harvest identities.
Could Your Jewelry Stop Hackers?
Google has been talking about an innovative idea to replace passwords with jewelry — that’s right, jewelry. Actually, the enabling technology could be hidden in jewelry, such as a ring , which would perform secure cryptographic transactions that would obviate the need for the user to enter a password.
A Better Way to Manage the Configurations and Passwords of Network Devices
Enterprises depend on network availability for business continuity and network configuration data lies at the core of enterprise network administration.
Password Manager Pro Consolidates Leadership in Privileged Identity Management
First some statistics: Global customer base grew by 45% during 2012; Grew 61 percent in Germany; Netherlands 52 percent; Australia 50 percent; Canada, UK and USA 45 percent; Middle East 36 percent Won the goodwill of SMEs as well as a great number of large enterprises; New deployments include three of the world’s largest enterprises and 12 Fortune 500 corporations More than 50,000 administrators and over 150,000 users log in every day and manage millions of privileged passwords Password Manager Pro has one of the largest customer bases in enterprise privileged identity management market Now, the details: We have added 45 percent more customers to our global customer base in 2012. The soaring customer base is driven by robust growth in multiple countries across the globe confirming our leadership position in privileged identity management. In addition to continuing the winning streak on earning and retaining the business of SMEs, Password Manager Pro has won the goodwill of a great number of large enterprises that have deployed it to control access to the massive IT infrastructure of their complex data centers
Beware: Hackers in your car, TV and light-bulbs?
We all know we should be careful transacting online, but are you thinking about cyber-security when you’re watching TV or driving your car? If you’re like me, those flashy new products at last week’s CES show probably got you dreaming about upgrading some of your old-school gadgets. The trend today is moving away from stand-alone devices to futuristic “connected” devices, those that can talk to the cloud or even interact with your other systems and appliances.
Triple Recognition for Password Manager Pro this year! World’s Mightiest Enterprises Repose Trust!
The IT divisions of three of world’s largest organizations – software maker, retail chain and virtualization platform provider have deployed Password Manager Pro to manage their privileged passwords this year! With 2012 fast drawing to a close, we just looked back and reflected on the year just gone by. What a fabulous year it has been! Password Manager Pro has continued its winning streak all along! While we have kept our existing customers across the globe very happy, the product has won the business and goodwill of a great number of large enterprises as new customers
Password Reuse, Insider Threats – The Most Dangerous IT Security Issues in 2012!
Deploying a password management solution would indeed be the best start towards information security this festive season! 2012 is fast drawing to a close. While looking ahead for a great holiday season and a wonderful New Year 2013, we just looked back and reflected on the year just gone by. 2012 had been fabulous in many counts, but when it comes to information security, it had indeed been a year of high profile security breaches and identity thefts across the globe. Individual users and mighty enterprises alike have fallen prey to hackers.