Category: Industry News

Two-Step Verification (2SV)

A majority of sites and applications typically require the use of a username, as an identifier, and a password, as a primary authentication method. Depending on assessed risks and the sensitivity of data accessed through the login form, a more secure login posture may be required. A MultiKey authentication system provides the opportunity to configure…
Read more


April 12, 2021 0

Could Security Tokens Be Bigger than Bitcoin?

Bitcoin is the world’s most recognizable encrypted, digital cryptocurrency coin; however, Bitcoin is just one of over 4,000 different types.  The top five largest, by market cap, are: Bitcoin (BTC), Ethereum (ETH), Ripple (XRP), Bitcoin Cash (BCH) and Cardano (ADA). Combined, these five are currently worth $250 Billion USD. Bitcoin makes up over half of…
Read more


September 30, 2019 0

Servers at End of Life – An Opportunity for Growth

Microsoft has announced that their Windows Server 2008 End of Life (EOL) is set for early next year (2020) and their Windows Server 2012 is slated for EOL in 2023. End of Life, for Microsoft, means that they will no longer provide any support or updates for these products, putting them at inevitable risk for…
Read more


September 16, 2019 0

The Human Aspect of Ransomware

You may have read or heard about cities in Florida and Baltimore being hit with ransomware that essentially stopped them from providing services. Ransomware, a form of malware, is a plague to businesses worldwide. It locks your data away in a secured (Encrypted) format that denies you any way to access or use it. Ransomware can…
Read more


July 9, 2019 0

FIDO: Security without Passwords

First, a test question:  What is the word FIDO generally thought to be? Name of a family dog Name of a zombie movie An acronym standing for Fast Identity Online All of the above You have 30-seconds and there is no prize for a correct answer.  OK, times up and “d” is the correct answer;…
Read more


January 21, 2019 0

Suspicious Packages

Within the last decade, there has been an uptick of incidents where police are called to evaluate a “suspicious package”. Inevitably, the bomb squad is called in and at times the item is destroyed or blown up in a controlled manner to neutralize the threat. No chances are taken and safety is not compromised on…
Read more


November 20, 2018 0