How to Implement Multi-factor Authentication Successfully and Share Data Securely
Keyavi Data Corp., a cybersecurity trailblazer whose game-changing technology is stopping cybercriminals in their tracks and reshaping the very nature of the data security industry, today kicked off its observance of Data Privacy Week by issuing a set of best practices for keeping personal and business data out of criminal hands using multi-factor authentication (MFA).
Marketing Technology News: Pavilion Data Systems Appoints Shridar Subramanian As Chief Marketing and Product Officer
“Poor password hygiene habits are still very commonplace, and compromised credentials are one of the top causes of data breaches, costing companies millions of dollars annually,” says T.J. Minichillo.
These “Best Practices for Keeping Data Private” explain why MFA remains one of the best defenses for mitigating password risk and preventing cyber criminals from exploiting user credentials. The tips — available at Keyavi’s site here — also provide guidance on choosing the right MFA option to prevent unauthorized users from accessing personal or corporate data.
“Poor password hygiene habits are still very commonplace, and compromised credentials are one of the top causes of data breaches, costing companies millions of dollars annually,” said T.J. Minichillo, Keyavi’s chief information security officer and VP of cyber threat & intelligence.
More than a third of Americans admit to sharing their password with others, while a majority use the same login for more than one account, according to Security.org. Both practices can seriously compromise online security.
“Today’s cybercriminals have tools to crack even complex passwords in seconds, which is why MFA is an increasingly important means for validating user identities,” Minichillo added. “Used correctly, it can provide an additional layer of security to prevent opportunistic threat actors from compromising credentials, even if those credentials are exposed during phishing campaigns, brute force attacks, keyloggers, credential stealing malware incidents or many other types of sophisticated cyber intrusions.”
As the COVID-19 pandemic continues, and an unprecedented number of people continue working remotely, it is vital that companies reduce their cyber attack surface across every endpoint, including data stored in the cloud.
Marketing Technology News: Digital Marketer Spot On Acquires Smart Traffic Consulting