Security Experts Jeff Schmidt and Doug Howard Discuss Mitigating Cyber Threats

Security Experts Jeff Schmidt and Doug Howard Discuss Mitigating Cyber Threats

Written By: Admin

Enterprises are more focused today than ever before on securing their networks and ensuring that sensitive information about their company and customers is not compromised. Despite this attention to security, if it often feels like a new, major cybersecurity breach is making the news every week.

Five recent breaches in particular seem to have caused quite the stir in the cybersecurity community, mostly due to the fact that we – or someone we know – was most likely impacted. Starbucks, Anthem, Dropbox, JPMorgan Chase, and the Office of Personnel Management (OPM) were all victims of major breaches that saw the personally identifiable information (PII) of hundreds of millions of individuals get exposed.

On July 22, 2015, Authomate CEO Jeff Schmidt and Savanture CEO Doug Howard got together with Access Granted’s executive editor Ryan Schradin to discuss these breaches in greater detail, and discuss how multi-factor authentication could help mitigate the issue.

The online event, which was the first in an ongoing series of security and authentication-focused Webinars, was entitled, “Anatomy of a Breach.” The Webinar exposed how the breaches occurred, what was compromised, who was impacted, and concluded with Doug and Jeff sharing some key takeaways and best practices.

Click HERE to watch the replay of the “Anatomy of a Breach” Webinar (registration required)

According to Mr. Howard, the key aspect in improving security is to “keep track of what is happening in the marketplace, where compromises are coming from, and then think about how those would get fixed on a regular basis.”

Doug also believes that multi-factor authentication could have helped prevent the majority of the aforementioned breaches. According to Doug, “Multi-factor authentication will surely solve many of those problems that occur within the marketplace. In fact I think of all the ones we’ve discussed, multi-factor authentication would have helped prevent most of them.”

Doug highlighted the fact that, as more household items and devices get network connectivity, “this problem is only going to get bigger and bigger. Whether it’s your car, refrigerator, or doorbell that is now IP based, don’t forget that that information is valuable, and you need to make sure you protect it.”

Jeff also had some words of advice, warning attendees that we’re spreading our credentials across too many devices. We’ve begun to suffer from, “password fatigue and user-ID fatigue, and we have to solve that at the root of it to at least mitigate the ability to give away access.”

There’s no silver bullet when it comes to maintaining end-to-end security hygiene, “but we have to start by adding the authenticity to the authentication, and building a better and more convenient way for the users rather than just adding more layers. We need to make it as simple as unlocking your door with the security of having it in a maximum security safe somewhere.”

Click HERE to listen to the Webinar in full and learn more about some of the most recent, high-profile breaches (registration required).

1 Comment

  1. The Weekly Data Breach Report - Access Granted
    The Weekly Data Breach Report - Access Granted2 years ago

    […] This week the worst passwords list for 2015 was released and once again it showed that the most commonly used passwords are 12345 and password.  While there were some longer passwords on the list, like 1234567890, and some that included both characters and numerals, like passw0rd, we’re still a sorry lot when it comes to creating passwords that will actually prevent our personal data from being stolen.  It might be time for everyone to revisit this post from late last year that has some interesting ideas to improve password security levels without breaking your brain.  Another strategy to beat the password fatigue can be found here. […]

Leave a Reply