So the big question is - is it actually safe for your employees to use security questions as a way to authenticate or recover account access? The short answer is...
The My1Login events team took the road last week for InfoSecurity Europe 2015 in London. It's the 3rd year in a row that our team have exhibited at the event with...
Verizon’s 2015 Data Breach Investigations Report has found that over 90% of attack patterns involve a single, common denominator: people. Human error is a primary...
The My1Login team are pleased to announce that we are exhibiting, for our third year running, at Infosecurity Europe on June 2nd – June 4th at Olympia, London....
You could be forgiven for thinking that only large, rich brands like Sony, Adobe, and JP Morgan are the companies targeted by hackers as they’re pretty much the...
Would you take offense if someone called you gullible, naïve, easy to fool? Of course you would! But have you never been duped, not even by fake jeans, fake...
Whichever way you look at it, the notion of cloud computing appears to be the logical, if not miracle, solution for end users who want to access their files...
Please, sir, I want some more… No, that was a different Oliver, wasn’t it? Even so, like young Master Twist, hackers have come back for a second pass at the buffet...
Here’s a riddle for you: lie back, relax, close your eyes, and think about the last time you did a SWOT analysis. Let’s forget about the opportunities and threats...