Don’t fall into the security trap of only focusing on the weakest link

(c)iStock.com/Expose-GmbH

“Your security is only as good as the weakest link.”

We’ve all heard it said; perhaps we’ve even said it ourselves. But I have a problem with this saying.

It tends to imply that you should focus on the weakest link which often isn’t the case especially if, in the case of PBCaK – problem between computer and keyboard – the weakest link is hardest to solve. It’s not necessarily the issue that’s going to give you the quickest ROI and...

By Andy Boura, 10 September 2015, 0 comments. Categories: Data Loss, Security.

Biometrics: The hazards and their mitigation for effective use

(c)iStock.com/Tuomas Kujansuu

With the recent release of Windows 10, and Microsoft supporting Intel’s biometric authentication in the new OS, we should take a moment to think about whether this is a good idea. It's hard to argue with the convenience offered by biometrics. There's also little doubt that they are often going to be more secure than a poorly chosen, re-used, or just plain weak (or default)...

By Andy Boura, 12 August 2015, 0 comments. Categories: Enterprise Mobility, Identity, Security.