User Authentication

NIST Unveils Guide to Mobile Device Authentication for First Responders

June 3, 2021 - A new NIST report sheds light on the role of mobile device biometrics for authentication to provide first responders immediate access to sensitive data, as an increasing number of public safety organizations adopt mobile devices to increase access to data. “Public safety organizations face technology challenges that hinder their ability to...


More Articles

CISA Insights on APT Compromise of Microsoft 365 Via Password Exploits

by Jessica Davis

The Department of Homeland Security Cybersecurity and Infrastructure Security Agency released an alert, warning that the advanced persistent threat (APT) actors behind the SolarWinds cyberattack...

DHS CISA Alerts to MedTronic MyCareLink Medical Device Flaws

by Jessica Davis

The Department of Homeland Security Cybersecurity and Infrastructure Security Agency released an alert, warning healthcare organizations of serious vulnerabilities found in certain MedTronic MyCareLink...

COVID-19-Related Phishing Lingers, as New Attacks Use Vaccine Themes

by Jessica Davis

New reports from Armorblox and KnowBe4 show threat actors are continuing to prey on fears around the global COVID-19 pandemic, leveraging lures designed to increase the likelihood of success....

Flaws in GE Radiology Medical Device Authentication Pose Patient Data Risk

by Jessica Davis

The Department of Homeland Security Cybersecurity and Infrastructure Security Agency is warning all hospitals and other healthcare delivery organizations of an authentication flaw found in...

Disclosed OpenClinic Flaws Pose Remote Code Execution, PHI Risk

by Jessica Davis

Researchers from Bishop Fox Labs discovered four vulnerabilities in the OpenClinic application, an open-source health records management software, which could allow an attacker to read patient...

Top Strategies for Implementing Multi-Factor Authentication

by Kelsey Waddill

Multi-factor authentication (MFA) can block more than 99 percent of automated cyber attacks, yet healthcare organizations often wait until their security has already been breached before turning to...

CISA Alerts to Phishing Campaign Spoofing COVID-19 Loan Relief Site

by Jessica Davis

The Department of Homeland Security Cybersecurity and Infrastructure Agency released an alert, detailing an ongoing phishing campaign spoofing the Small Business...

NIST Shares Final Zero Trust Architecture Strategies, Guidance

by Jessica Davis

NIST unveiled the final version of its Zero Trust Architecture publication, which sheds light on the enterprise security model and provides private sector organizations a road map for...

BEC Phishing Campaigns Bypass MFA, Target Office 365 Executive Accounts

by Jessica Davis

Entities should be on the alert for an increase in two business email compromise campaigns. One report found an increase in BEC phishing campaigns targeting the Microsoft Office 365 accounts...

DHS CISA Urges Patch of Critical Palo Alto Pan-OS Vulnerability

by Jessica Davis

Palo Alto Networks released an advisory regarding a critical vulnerability found in its PAN-OS, which could allow a hacker to gain access to protected resources. In response, the...

DHS Shares Cloud, Microsoft Office 365 Insights for COVID-19 Telework

by Jessica Davis

The Department of Homeland Security Cybersecurity and Infrastructure Security Agency released COVID-19 telework guidance for Microsoft Office 365 and other cloud services, given many organizations have...

Can Multi-Factor Authentication Help Healthcare’s Security Posture?

by Jessica Davis

Microsoft has found multi-factor authentication (MFA) blocks 99.9 percent of automated cyberattacks on Microsoft platforms, websites, and other online services. As hackers continue to target user credentials and email compromise, providers...

IT Security Leaders Engage in Risky Security, Password Habits

by Jessica Davis

IT security practitioners routinely engage in risky password and authentication practices. And there’s a misalignment between expectations and reality when it comes to the implementation of...

Healthcare access badges: Physical, logical access links

by Dean Wlech

Healthcare organizations using access badges to secure physical access to (all or part of) their premises increasingly ask for the ability to use the same badges for access to their network and...