Monthly Archive for: ‘2 years ago’

The seven myths of cybersecurity: Strong passwords = strong security

The seven myths of cybersecurity: Strong passwords = strong security

Most enterprises know that they need strong cybersecurity to protect their intellectual property and other valuable information – such as …

Read More

PODCAST – The effectiveness of location and intent as authentication factors

PODCAST – The effectiveness of location and intent as authentication factors

In previous posts on Access Granted, we’ve discussed the need for multifactor authentication for both consumers and enterprises, and have …

Read More

The need for multi-factor authentication in the enterprise

The need for multi-factor authentication in the enterprise

As cyber attacks continue to threaten networks around the world, organizations are scrambling to ensure that their most sensitive data …

Read More

Attacking the gaps in traditional security

Attacking the gaps in traditional security

Our growing reliance on our connected lifestyle is evolved hand-in-hand with security threats and bad actors. As technologies increase their …

Read More

How hackers attack POS systems, and how to better protect them

How hackers attack POS systems, and how to better protect them

In a previous post on Access Granted, I took a detailed look at the POS systems in place across most …

Read More

A detailed look at POS system security and where they’re vulnerable

A detailed look at POS system security and where they’re vulnerable

Point of sale (POS) technology has been around for many years starting with the cash register in late 1800s and …

Read More