WatchGuard Blog - Access & Identity Authentication

Are You in Control of Your Personal Information?

On 28 January 2022, the 16th edition of Data Protection Day will be celebrated globally. It aims at raising awareness on the right to data protection, and from WatchGuard we offer you 8 basic tips to achieve it.

Digital signatures must use MFA

Digital signatures are increasingly used in companies and public administrations. However, without adequate cybersecurity measures, this method can be a vector for cybercriminals and fraudsters.

Digital signatures must use MFA

Digital signatures are increasingly used in companies and public administrations. However, without adequate cybersecurity measures, this method can be a vector for cybercriminals and fraudsters.

Knowing where access attempts come from, the key to MFA

The good thing about risk-based authentication is that it takes risk factors into account when performing an authentication decision. WatchGuard partners can now offer their customers increased security in their authentication processes through push notifications that include geolocation.

Credential leaks are growing on the dark web

Last year saw a 429% increase in the number of login credentials exposed on the dark web. Multi-factor authentication has become an essential security layer to ensure that whoever is entering credentials is the real user and not a usurper.

Credential leaks are growing on the dark web

Last year saw a 429% increase in credentials exposed on the dark web. MFA has become an essential security layer to ensure that whoever is entering credentials is the real user and not a usurper.

Old mobile numbers can compromise unsecure MFA systems

A recent study has analyzed the risks of reusing old mobile phone numbers. It found cases where new users received SMS messages with access to confidential information of the previous owners and also links to some of their online accounts due to MFA of those accounts.

How Cybercriminals Avoid MFA and Tips to Stop Them

As we often point out, layered defenses are essential for protecting valuable assets because there is no bulletproof solution in the security industry. Case in point: while multi-factor authentication (MFA) is considered one of the most crucial security defenses in existence, cybercriminals can…