State of Password Security: Businesses Still Falling Short

Despite the increasing concern regarding privacy and protection, individuals and businesses are still falling short. The recent survey from The Ponemon Institute with authentication key vendor Yubico shows that IT professionals are still falling short when it comes to security practices in the workplace. The survey interviewed over 1,500 IT professionals and security practitioners to […]

Read More…

An Overview of Yubikey Two Factor Authentication

The password is arguably the most popular and most common security measure available and yet can be the most vulnerable if not managed securely. Passwords, for example, do not provide a reliable identity check, verifying that the person using the password is the owner. A hacker who manages to steal your password can directly access […]

Read More…

How To Reduce Identity Theft with Multi-factor Authentication

How secure is your identity? Can you say with certainty that your passwords cannot be hacked? Admittedly this is a hard question to answer, nothing is ever certain despite best efforts, but what we can do, is apply best efforts. Your identity (who you are, what you do, what you access) whether it is accessing […]

Read More…

5 Password Hacks from a Cybersecurity Expert

With so many high profile data breaches over the last 12 months, businesses large and small have focused on boosting their cybersecurity. But, employee passwords still remain a major weakness in many organisations’ cyber defences. He comments: “The use of biometric identification, such as fingerprints, iris, voice or facial recognition might be on the rise, […]

Read More…

Biometric identification: why the ‘silver bullet’ of authentication won’t really mean the death of the traditional password

Biometric identification might be the latest weapon in the cybersecurity battle, but, as the news that people could be unwittingly giving their fingerprints to hackers via peace sign selfies shows, it is not without risk; those risks mean the traditional password won’t be disappearing any time soon. The password has been on its last legs […]

Read More…

The rise of the global economy and password security

The rise of global economy and the emergence of commercial off-the-shelf (COTS) technology have produced great efficiencies and innovation. Nowhere is this more evident than in information and communications technology, which has undergone a revolution in the past two decades. The current global ecosystem provides lower costs, interoperability, and flexibility to manufacturers and their customers, […]

Read More…

Meet the team at ICT for Education 2016!

Hypersocket Software is pleased to announce that the team of security experts will be exhibiting at ICT for Education on 18th November 2016 at Cranmore Park, Birmingham. Why should you stop by our stand? We’ll be showcasing our new suite of solutions at the show, our unique Single Sign-On virtual appliance for seamless access to cloud and on-premise […]

Read More…

The Secret to an Effective VPN

Secure, remote access to mission-critical applications and data is one of the most sought-after capabilities organizations in every sector need. Recently, within the oil and gas sector, for example, massive reserves of liquid natural gas were found off the coast of Tanzania. The ability for third-party vendors to securely and remotely access operational data is […]

Read More…

The Top 3 Corporate IT Security Mistakes

The IT security group within every corporation is under file. Relentless cyber-attacks, user errors and improperly designed and implemented processes and procedures contribute to a maelstrom of problems that executives expect to be instantly solved. The news for IT departments continues to sound dire. Companies like Symantec estimate that 56% of employees believe it is […]

Read More…

Alphabet Soup: Navigating SCADA, and Industrial Control Systems and VPNs increasing importance in all of these technologies.

All the terminology is daunting. Whether, Operational Technology (OT), Industrial Control Systems (ICS), Supervisory Control and Data Acquisition (SCADA) or Internet of Things (IoT), it’s important for the C-suite of executives to understand the differences and find a way to maintain the accessibility of these technologies while complying with local regulations. One greatest common denominator […]

Read More…