The IDEE Blog
Everything you need to know about Authentication
Featured
Latest
Whitepaper: Preventing Privileged Account Takeover
This whitepaper addresses the critical threats of privileged identity and access management within organizations. It outlines the risks posed by identity compromise, such as phishing and credential theft, and emphasizes the importance of implementing Privileged Identity Management (PIM) and Privileged Access Management (PAM).
What We Learned About MFA at Our Latest Cybersecurity Event
At our latest cybersecurity event, Infosecurity Europe 2024, we decided to dig into the nitty-gritty of Multi-Factor Authentication (MFA). We wanted to know how folks are using it, what technologies they are using, and what headaches they are facing. We have got some cool insights to share with you, so let us dive right in!
Microsoft APT Phishing Breach - Your Next Steps
Microsoft’s top executives’ email accounts have been breached. What does this mean for you? What do you need to know and what should you do moving forward?
CitrixBleed Attacks
What do you need to know about CitrixBleed attacks - other than with AuthN by IDEE organizations would have prevented any credential theft? In this article we’ll cover what happened, who was affected, why it happened and more importantly how you can protect your own systems and networks.
What is Transitive Trust?
You will have heard of “transitive trust” when applied to security and in its traditional sense. It refers to trust that exists between domains or companies. But how about in the context of multi factor authentication? We explore what it means in the application of AuthN by IDEE.
Fastest MFA - Integrate in Seconds: Point. Click. Protected.
Want an MFA solution you can set up in literally seconds? We've just launched Point, Click, Protect. Rapid integration with no code & no agents. Learn more ...
Breaking Down the Barriers: Why Phish-proof Multi Factor Authentication is the Turning Point for Cyber Insurance
In this post we’re talking insurance. Cyber insurance. What are the challenges for the industry and SMEs (Small and Medium Sized Enterprises)? And more importantly what is the solution?
IDEE Limited Joins Select Cohort in The UK’s Largest Cyber Accelerator Program
Cyber Runway, delivered by Plexal, is the UK’s largest accelerator program, focusing on the cyber security marketplace. Funded by the Department for Science, Innovation and Technology (DSIT) in partnership with Deloitte and the Centre for Secure Information Technologies, the program has welcomed 42 new businesses, including IDEE Limited.
Retool Suffers Social Engineering Breach
AuthN by IDEE Product Updates August 2023
You know what you need? Better MFA (Multi Factor Authentication)! Well, you're in the right place! Come and check out our new product feature updates!
Best Passwordless Authentication Software: AuthN by IDEE Wins Big on G2
We are thrilled that we currently have a score of 4.8/5 on G2, based on the product reviews provided by our customers – those who matter the most. We also score highly on ‘The Easiest to Do Business With’ within the category, Best Passwordless Authentication Software, winning this accolade time and again. This post explains why we are partnering with G2.
InfoSec Europe 2023: AuthN by IDEE on Tour!
A summary of our time at infoSec Europe 2023 including videos of the presentations we gave, and our key take-aways from talking to so many people across the three days.
FIDO2 Deployment in the Enterprise
In this post we are going to explore the advice emerging from FIDO Alliance, created to support the deployment of the FIDO2 standard in the enterprise. We discuss the recommendations and how to execute it along with the challenges it poses.
AiTM Attack Prevention Strategies: A Challenger’s Perspective
The escalated prevalence of AiTM (Attacker in the Middle) threats in 2023 requires innovative and reliable cybersecurity countermeasures. In this blog we contrast two distinct AiTM mitigation strategies. Its Microsoft vs. AuthN by IDEE.
Passwordless Authentication With Legacy Systems: A Comprehensive Guide
We all know the problem; password-based attacks have been on the rise for years now and that curve shows no sign of slowing down. Passwordless authentication could be the answer, but what if you have legacy systems? Fear not... we may have the answer!
What Is An Adversary-in-The-Middle Attack (AiTM)?
Here at IDEE HQ, we like putting this stuff to the test. We got our hands on Evilginx and tried breaking through Microsoft Authenticator and then AuthN. Watch the results & find out more about how an Adversary in The Middle (AiTM) attack works, and what can be done to prevent it and keep users protected.
Securing the Remote Workplace with MFA
More businesses are offering flexible or fully remote job roles as the trend for WFH continues to grow, but there are still ongoing cyber security challenges. We discuss the issues and how multifactor authentication (MFA) can help organisations secure the remote workforce.
Udo Gärtner Deploys AuthN by IDEE MFA Overnight after Breach
What happens when a major breach starts to quickly accumulate costs and business grinds to halt? Well, you need a really swift resolution. Preferably phish-proof MFA. Did we mention that AuthN can be deployed in as little as 15 minutes? Find out exactly what happened in our latest case study.
IDEE Launches its new MSP Partner Program for Managed Service Providers
Contrary to common belief, deploying MFA can be very simple. MSPs can deploy AuthN in minutes and provide a robust solution that prevents all credential phishing and password-based attacks against modern and legacy systems.
Al Lakhani, IDEE: “seven out of ten ransomware attacks can be stopped”
Cyberthreats have always been lurking around virtually every corner, waiting to attack either an individual or a whole organization. And with employees working from home and depending on barely protected or unprotected technology, attacks have become easier.
Protect Your Organisation from the Bad Guys with Multi-Factor Security
Even if you deploy password managers, or educate your workforce about the perils of weak passwords; the continued use of password-only authentication systems does not protect your organisation from bad actors. Multi-factor Authentication (MFA) provides a more reliable and efficient way. Read on to explore the various benefits of multi-factor security.
How to Set Up MFA: A Brief Guide
Multi-factor Authentication (MFA) provides strong, reliable security against the rapidly-evolving cyberthreat landscape. MFA uses two or more authentication factors to verify a user’s identity before granting them access to a system or application. But how to set up MFA? Read on to know more.
A Guide to Multi-Factor Authentication Solutions
In a world where organisations are constantly at risk of losing their valuable data to clever pretenders, user authentication is vital. To minimise their risk and protect themselves, organisations need more secure user authentication methods. They need multi-factor authentication solutions.
7 Passwordless Risks and How to Mitigate Them
With all the benefits of passwordless authentication also come a few risks. This article shows you the seven risks you should have in mind and fortunately, how they can be mitigated.
Passwordless Cost: Here’s What You Wanted to Know
Passwordless cost easily outweighs cybersecurity risks, financial costs and productivity losses common with password-based systems. But what exactly is the passwordless cost? This article will give you a comprehensive overview of all aspects and benefits you need to consider.
Why Organisations Should Count on Passwordless Security?
The best way to close many security gaps is with passwordless security. In addition to improving the organization’s security posture, passwordless security eliminates user friction and reduces the administrative burden on IT teams with respect to password-related helpdesk tickets. Passwordless security is the future of digitization and enterprise cybersecurity risk management. Here’s why.
Authentication: Why you should go passwordless today
By 2022, 60% of large enterprises, and 90% of midsize firms will go passwordless for over 50% of use cases. But presently, many organizations struggle to do so.Here’s why.For many companies, passwords are embedded in legacy systems that use old protocols and identity stores like LDAP for password authentication. Although it is possible to eliminate passwords even in legacy systems, organizations rarely consider this option, and still rely on password-based authentication.
5 Compelling Reasons for Enterprises to Go Passwordless
Many of these security issues can be traced to unauthorized access caused by weaknesses in password-based systems. That’s why a better approach to authentication is required. The answer lies in strong passwordless authentication. Here are 5 compelling reasons why.
The Weaknesses of “Passwordless Experience” vs the Strengths of “Completely Passwordless”
The modern-day security threat landscape engenders a need for robust authentication methods for reliable enterprise security. Simultaneously, there’s also the need to. As the complexity of doing business increases with technological challenges, maintaining a balance between security and user experience remains more critical than ever.“Passwordless authentication” is discussed by many experts as a powerful way to help achieve this goal and push the envelope of enterprise security and authentication.
The Real Cost of Passwords : Why 2FA and SSO don't help
Passwords are expensive for companies. And no, it's not just about the costs that can be incurred if these passwords are stolen or misused. It's also about the fact that passwords cost money in themselves, even though this may not be obvious at first glance. In this article, we look at the true cost of passwords and explain why it is not enough to simply make passwords "more secure".
Kill the password before it kills you : A Tale on Password Security
As long as there are passwords users, employees and partners will get hacked. The password remains the single biggest threat and alongside with it the attacks that make it so dangerous such as phishing.
What is Zero Trust Architecture? And why there's still lots to be done
Zero Trust Architecture (ZTA) is a concept that has been around for quite a while now. However with recent events such as the global pandemic and thus a rise in work-from-home policies and eroding perimeters, the topic has regained importance more than ever. In this article we'll digest the latest Zero Trust Architecture release by NIST, help you understand it's tenets and introduce it's inherent weaknesses.
Why Twitter Got Hacked and How to prevent it
In one of the most brazen cyberattacks in recent history, some of the most influential Twitter accounts were compromised in mid-July. Twitter handles that got hacked included powerful names like Elon Musk, Bill Gates, Kanye West, Joe Biden, and even the former United States President Barack Obama. How could this happen? And how can attacks such as these be prevented?
You should not ask your users to change passwords after a breach. Here's why
Some organisations do it as precautionary measure, others because the login credentials were not secured properly. But: With gazillions of credentials out in the wild, available anywhere, and users continuing with simple permutations, changing the password doesn't solve the problem.
MFA (Multi Factor Authentication) vs 2FA (2 Factor Authentication): What is the difference?
When trying to. find the best authentication solution the terminology in the landscape can often be confusing, especially when it comes to two factor vs multi factor authentication. In this article we go through a detailed comparison of the two to help you be informed.