Are You One Password Away from a Data Breach?

Email     |     Share  
1 | 2 | 3 | 4 | 5 | 6 | 7 | 8
Next Next

Turn on Two-Factor Authentication

IT pros should consider implementing two-factor authentication, which requires an additional step before logging into an account, even if the correct password is used (typically through a text message or email that requires the user to verify that they are attempting to login to the given account). Using two-factor authentication provides an additional level of security to ensure the right people are accessing the appropriate accounts.

With more activity happening in the cloud and employees more frequently working remotely or from a mobile device, IT pros are constantly challenged to keep data secure. The volume and frequency of data breaches is evidence enough of the risks facing today's businesses. For instance, the Identity Theft Resource Center (ITRC) reports that the number of U.S. data breaches tracked in 2015 was more than 750.

A data breach will certainly have an impact on a company's reputation and credibility. But what are the tangible implications of a data breach? According to an IBM-sponsored study conducted by Ponemon Institute, the average cost paid for each lost or stolen record that contained sensitive and/or confidential information was $154. In a single attack, a hacker could gain access to hundreds of thousands of accounts, the cost of which can add up quickly.

Cybersecurity is a key issue for every business, and outside of large enterprises, most companies have a small IT team charged with managing security, in addition to their other responsibilities. To help improve overall cybersecurity practices, the first line of defense is often an educated user with strong password practices. In this slideshow, Joe Siegrist, VP and GM, LastPass, has identified ways IT pros can better manage access and improve user password security practices.

 

Related Topics : Unisys, Stimulus Package, Security Breaches, Symantec, Electronic Surveillance

 
More Slideshows

Security117-190x128.jpg 5 Steps to Protect Executives from a Whale-Phishing Attack

Whaling is a type of spearphishing targeting "big fish" in an organization with access to sensitive, highly-valuable information. ...  More >>

Security116-190x128.jpg 5 Common Failures Companies Make Regarding Data Breaches

Five common failures companies make when preparing for, and responding to, a data breach, as well as guidance for companies on how they can tackle these issues. ...  More >>

Security115-290x195 Data-Centric Approach Starves Data-Hungry Cybercriminals

Incorporating security capabilities such as encryption, better control and management and a data security framework will help alleviate the burden breaches place on the organization and people's lives. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.