Authenticating by Device vs. by User

Posted by Julie Villanueva on Nov 8, 2021 5:41:50 AM

Thought about upping the ante on your security protocols? Control employee access through the identity of the user’s device rather than just the identity of the user.

Read More

Worst Security Breaches of 2021 So Far

Posted by Julie Villanueva on Sep 1, 2021 9:26:39 PM

In 2021, the world saw a rise in security breaches on a national and global scale. Data leaks and compromised systems resulted in data and revenue losses and put millions of users at risk.

The possible cause of these events: Working from home. Covid-19 pushed nearly 42 percent of the U.S. labor force to work from home full-time.  Consequentially, working from home lacks the robust security infrastructure an in-office environment provides. Because of this, many hackers found an opening to attack through in-home offices, as there were more chances of human error and weak cybersecurity systems.

Now in 2021,  breaches are only continuing to grow.  In Sonic-wall’s mid-year update, there were over 2.5 billion malware attacks and 304.7 million ransomware attacks in the first half of 2021 alone. Incidents like these may continue to increase until the end of the year, and it’s best to learn from the major events to prevent them from happening to you.

Let’s dive right in: 

Read More

Security Tools for Managing a Team of Contract Engineers

Posted by Julie Villanueva on Aug 6, 2021 4:14:13 AM

Contract engineering teams consist of workers who only work for a short while. In a situation where you are cycling in and out numerous employees during a season, there may be a potential for breaches and malware.

Contractors coming in from everywhere and going anywhere have access to highly valuable information and systems. This leaves your company vulnerable to a breach during their employment and even after they leave.

For example, in 2017, an ex-employee of Tesla hacked the company's confidential and trade secret information, transferring the data to third parties by placing software on the computer system that would continue to run even when the employee left the company.

Read More

PKI Certificates vs. Using Username and Password

Posted by Julie Villanueva on Jun 30, 2021 6:06:45 AM

Julie Villanueva

Public Key Infrastructure (PKI) is a system that allows you to encrypt and sign data for better security purposes. PKI certificates digitally authenticate the identity of a user in order to ensure safe use of an account, device or service. PKI provides a safer way for a known user to securely connect to both public systems like web pages, as well as private systems like VPN’s, Wi-Fi® and other forms of multi-factored authentication systems.

Usernames and passwords are becoming a thing of the past for modern businesses. PKI certificates at the same time are becoming more prevalent and cost-effective giving more reason for companies to throw out the standard username and password as their authentication mechanism.

Read More

Foxpass’s New Windows Login

Posted by Julie Villanueva on Jun 15, 2021 8:12:19 AM

 

Read More

PAM for HR & Engineering Teams - How Foxpass can Help

Posted by Julie Villanueva on Jun 3, 2021 11:16:49 AM

As an HR Administrator or Manager, there are many protocols to consider when onboarding, off-boarding employees. Every time someone enters your team, you are handing out sensitive information. Here, we will explore how a privileged access management (PAM) system like Foxpass helps keep breaches from previous and current employees from happening.

Off-boarding Employees:

Human resource teams constantly onboard and off-board new employees. But when employees leave a company, they take with them valuable information like account logins, Wi-Fi® passwords, and portal/terminal entrances. According to Forbes, improper employee off-boarding can cause big cybersecurity risks such as data loss, compliance violations, breaks in confidentiality, data breach, ruined reputation, and wasted spending. 

Our Cloud-Hosted LDAP is an employee directory that helps with onboarding and off-boarding employees by keeping their credentials and access permissions in a centralized location. This helps with keeping an organized account of who does and does not have privileges to prevent a high potential for security breaches.

Onboarding Employees 

There is an even higher risk with current employees to third-party cybercriminals who aim to break in through methods like malware. According to Security Intelligence, over 75% of security breach incidents come from insider threats. Teams must also think about managing access to those inside the business. 

Cloud-Hosted Radius enables individual users to be assigned permissions. It gives power back to the administrators to give and take away the amount of access an employee may have to an account or device. 

Another solution is Single Sign-On (SSO). This allows employees to automatically log in to all accounts through a single login. As an admin, you can also give and take away an employee’s login credentials via SSO after they are done with the account. 

Conclusion: PAM as the end-all-be-all solution

PAM makes it easier for HR teams and lessens the worry of potential threats. Foxpass offers Cloud-Hosted LDAP & Radius and SSO, for your business to protect your information from anyone that once had exposure to your information. And if you use Google Workspace, Okta, or Office365 in your HR workflow, we now integrate with these services. 

Learn more about Foxpass’ features and how to implement better security protocols within your HR and IT team to prevent potential breaches from happening.

Read More

Upgrade your security.

Click Here to learn how Foxpass can help you avoid costly security mistakes

Subscribe Here

Recent Posts

Categories