|By Marketwired .||
|October 16, 2013 12:49 PM EDT||
IRVINE, CA -- (Marketwired) -- 10/16/13 -- This October marks the tenth annual National Cyber Security Awareness Month (NCSAM), encouraging organizations to focus on online safety. Garret Grajek, Chief Technology Officer at SecureAuth, offers enterprises three tips to prevent their corporate data from being hacked.
"2013 has been full of advancements and changes that significantly alter enterprises' security needs and how they manage employees who use their own mobile devices at work, or BYOD," commented Grajek. "At first, the focus was solely on managing the devices, but after Edward Snowden's shocking exposé and Kalinin's attack on financials, including NASDAQ, securing identities, cloud resources, and mobile apps has become paramount."
Grajek recommends the following to better secure online identities and enterprise information.
1. Focus on securing applications and resources, not devices. More consumers are accessing corporate applications from their mobile devices for work-related functions, such as email and collaboration tools. Businesses should focus on securing the applications with two-factor authentication rather than devices, which enables users to access an app from any device without requiring hardware control.
2. Regain Control of Enterprise Identities. Companies often relinquish their internal control of employee or customer identities. This practice has not only been proven to be unwise by major hacks like Living Social, Evernote, and LinkedIn; but it is also incredibly costly for companies. Instead, enterprises need to uphold the management of identities, utilizing the same on-premise credentials for authenticated access into Microsoft Office 365, Google Apps, and other corporate resources.
3. Rethink Two-Factor Authentication. Hard tokens have always been common for authentication, but are also costly and cumbersome to maintain. Modern methods of authentication that increase security as well as ease-of-use are instead necessary. There are many different authentication mechanisms available, such as SMS, telephony, email, and PUSH OTPs that facilitate rapid first-time registration; as well as more advanced forms of authentication, like Device Fingerprinting to decrease friction in subsequent authentications.
Grajek is available for interviews by contacting Gina Ray at 949-370-0941 or firstname.lastname@example.org.
Located in Irvine, California, SecureAuth is a technology leader in providing single secured access to mobile, cloud, web, and network resources, serving over 10 million users worldwide. The SecureAuth IdP all-in-one, completely scalable solution delivers to IT departments a simplified way of managing and enforcing access based on existing user entitlements. For the latest insight on enterprise security, follow the SecureAuth Blog, follow @SecureAuth on Twitter, or visit www.secureauth.com for additional information.
SecureAuth, SecureAuth IdP and the SecureAuth logo are registered trademarks of SecureAuth Corporation. All other products or company names mentioned herein are trademarks or registered trademarks of their respective owners.
- Google’s Enterprise Problem
- Building Video Calling with PubNub and WebRTC
- DataStax Announces New Startup Programme Offering Free Software, As Well As Free Training Courses For Cassandra Users And New Developer Tool
- Get Ready to Think Out (C)loud With Cloud Sherpas’ Upcoming Webinar Series
- Evaluation Report on Virtual Backup Software
- New PubNub App Template for WebRTC
- Series: Exchange 2013 and Lync 2013 Integration with AsteriskNOW PBX Pt. 1
- Strategic Enough to Matter, Code Halos and Mobile Apps
- GAMA : Quatre acteurs clefs, quatre stratégies différentes !
- 7 Christmas Gifts For Your Business
- Box and NSI Partnership Brings the Cloud to Businesses in the Middle East
- Wowza Joins Google Cloud Platform with Google Compute Engine
- WebRTC Summit at Cloud Expo Agenda Announced
- OneLogin Raises $13M to Power Expansion
- Cloud Security Alliance Releases Cloud Controls Matrix, Version 3.0
- Survey Finds Large Enterprises Adopting WebRTC
- WebRTC Summit | WebRTC: Test then Disrupt
- WebRTC Summit Speaker Submissions Open
- WSO2 Expands Identity Management Capabilities Across Cloud, Mobile and Web Applications With the Launch of WSO2 Identity Server 4.5
- Twilio and LiveOps to Deliver WebRTC Deployments
- BMC Software to Exhibit at Cloud Expo Silicon Valley
- Oracle Demonstrates WebRTC Solution with CounterPath's Bria
- OpenStack for the Enterprise – Showcasing the OpenStack Ecosystem
- GENBAND Showcases WebRTC and Cloud
- Where Are RIA Technologies Headed in 2008?
- The Top 250 Players in the Cloud Computing Ecosystem
- Dolphin Announces Open API With Over 50 Add-ons Including Dropbox and Wikipedia
- Personal Branding Checklist
- AJAXWorld 2006 West Power Panel with Google's Adam Bosworth
- Why Microsoft Loves Google's Android
- Google's OpenSocial: A Technical Overview and Critique
- Cloud Expo New York Call for Papers Now Open
- Wal-Mart To Sell $399 Ubuntu Linux-based Laptop with Google Operating System
- i-Technology Blog: Google Trends on Java, McNealy, AJAX, and SOA Give Pause For Thought
- i-Technology Blog: Is There Life Beyond Google?
- Android: Who Hates Google Over the Phone?