Computer says no: Password problems leave UK workers wasting more than two days a year logging in

17% spend more than five minutes logging on each day A quarter must log in to five different apps and systems Nearly one in five write down passwords to remember them Nottingham, UK, 24th January 2017 – Poor password practices leave UK workers potentially wasting more than two days each year using multiple credentials to […]

Read More…

Tips to Transitioning New Projects to Business as Usual (BAU)

Handing off a new service or tool from one department to another, even within the same organization, is harder than it looks. Often times great ideas that lead to good initiatives are not properly adopted, understood or communicated by the groups tasked with running their day to day operations. For the company and strategic-facing development […]

Read More…

Integration Point: Password Manager and Digital Transformation

Disruption is everywhere. The S&P 500, normally a bastion of stability, experienced an unprecedented 50 percent churn rate in just the past 15 years. In 1999, General Electric and Coca-Cola were at the top of the list. Today it’s Apple and Google. And look at a company like Uber, which owns no cars and predominantly […]

Read More…

Top Three Issues Cloud-Based Password Managers Face

Password managers face a daunting task. The creation and management of user access to connected devices, as well as user access and authentication into external and internal applications, databases and networks is riddled with both scalability and security challenges. Complicating the matter is the fact that user authentication and verification are the cornerstones of any […]

Read More…

Hypersocket Software Introduces Enterprise Level Single Sign-On Technology at SME Prices

SSO and password hacks help businesses boost productivity and increase cybersecurity Nottingham, 02 June 2016 – With news that a seven character password now takes a hacker under a second to crack, the need for employees to use stronger, more complex passwords as an essential weapon in any organisation’s cybersecurity arsenal has never been more […]

Read More…

The Requirements Quagmire: Sidestep a Common Single Sign-On Implementation Issue

A good foundation is just as crucial in implementing a technology, like Single Sign-On, as it is in building a sturdy structure. In implementing a technology initiative, that foundation starts with acquiring and documenting the business and technology requirements in a clear manner. All too often the lack of properly documented requirements right from the […]

Read More…

SAML Authentication: A Pillar of Effective Single Sign-On

Effective Single Sign-On (SSO) solutions are in many ways similar to baking a cake. You need several key ingredients mixed together in a certain way and heated in just the right manner in order to get a refined and tasty final product. The Security Assertion Markup Language (SAML) is one of those key ingredients for […]

Read More…

The Key to Security, Growth and Innovation

In an ideal setting, password management delivers centralized management of privileged identities across the cloud, mobile and datacenter realms. Through this infrastructure the enterprise additionally gains a secure access for remote employees and controlled access for outsourced IT – without the need to manage more identities. In the past, password management challenges and privileged identity […]

Read More…

Businesses Integrating Single Sign-On

There are ample advantages of using technology for work purposes and thus, most businesses around the globe have integrated the use of technology. However, employees lament when it comes to password management, whether it is to frequently create a new password, resetting a forgotten password or dealing with one’s locked account. Nevertheless, passwords are one […]

Read More…

3 Password Misconceptions to Avoid

Passwords are a hassle but a necessary one in order to keep information and data safe. This is especially crucial for any organization that records and stores sensitive information – credit card numbers, social security information, customer data – but as we’ve seen in the last few years, these things can be susceptible to weak […]

Read More…