How To Reduce Identity Theft with Multi-factor Authentication

How secure is your identity? Can you say with certainty that your passwords cannot be hacked? Admittedly this is a hard question to answer, nothing is ever certain despite best efforts, but what we can do, is apply best efforts. Your identity (who you are, what you do, what you access) whether it is accessing […]

Read More…

5 Password Hacks from a Cybersecurity Expert

With so many high profile data breaches over the last 12 months, businesses large and small have focused on boosting their cybersecurity. But, employee passwords still remain a major weakness in many organisations’ cyber defences. He comments: “The use of biometric identification, such as fingerprints, iris, voice or facial recognition might be on the rise, […]

Read More…

Biometric identification: why the ‘silver bullet’ of authentication won’t really mean the death of the traditional password

Biometric identification might be the latest weapon in the cybersecurity battle, but, as the news that people could be unwittingly giving their fingerprints to hackers via peace sign selfies shows, it is not without risk; those risks mean the traditional password won’t be disappearing any time soon. The password has been on its last legs […]

Read More…

Artificial Intelligence – is it the Answer for Identity Management?

A rise in security breaches due to abuse of access has put the spotlight on Identity and Access Management. So how might Artificial Intelligence shape its future? Identity and Access Management (IAM) is already a key weapon in the security arsenal of many organisations as a way to mitigate against data breaches and manage the […]

Read More…

Computer says no: Password problems leave UK workers wasting more than two days a year logging in

17% spend more than five minutes logging on each day A quarter must log in to five different apps and systems Nearly one in five write down passwords to remember them Nottingham, UK, 24th January 2017 – Poor password practices leave UK workers potentially wasting more than two days each year using multiple credentials to […]

Read More…

The rise of the global economy and password security

The rise of global economy and the emergence of commercial off-the-shelf (COTS) technology have produced great efficiencies and innovation. Nowhere is this more evident than in information and communications technology, which has undergone a revolution in the past two decades. The current global ecosystem provides lower costs, interoperability, and flexibility to manufacturers and their customers, […]

Read More…

Meet the team at ICT for Education 2016!

Hypersocket Software is pleased to announce that the team of security experts will be exhibiting at ICT for Education on 18th November 2016 at Cranmore Park, Birmingham. Why should you stop by our stand? We’ll be showcasing our new suite of solutions at the show, our unique Single Sign-On virtual appliance for seamless access to cloud and on-premise […]

Read More…

The Secret to an Effective VPN

Secure, remote access to mission-critical applications and data is one of the most sought-after capabilities organizations in every sector need. Recently, within the oil and gas sector, for example, massive reserves of liquid natural gas were found off the coast of Tanzania. The ability for third-party vendors to securely and remotely access operational data is […]

Read More…