March 20, 2017

Billions and Billions Served used to be the number of burgers served up by McDonald’s, but in the last couple of years it has become a pretty accurate tag line for user credentials. The stats here are essentially irrefutable. 

  • 2/3 of account take-overs result from e...

February 28, 2017

We engage with companies all the time around the perils of credential theft and what to do about it. Just about every security expert I know agrees that on-line services must be protected with more than just a static ID and a Password, since its clear that 2/3 of accou...

January 24, 2017

What is one of the most poorly implemented security practices? “The practices where methods of protection are implemented that never change and where there is unlimited time to figure them out.” Yes, I am talking about IDs and Passwords.

If you think about it, this is w...

November 3, 2016

Knowing that two-thirds of data breaches were due to weak or stolen credentials, and having thousands of drivers and corporate users logging into their systems containing sensitive HR data, the leadership of CPC knew that usernames and passwords alone were not going to...

August 19, 2016

In mid-2016, according to an article in Fortune Magazine, it was finally revealed that as many as 167 million LinkedIn user names and passwords were available on the dark web. Shortly after the announcement, LinkedIn made 2-factor authentication an option for user acco...

July 5, 2016

Phreedom Phrom Phishing

By Chris Reese

According to the most recent data, over one half of Internet users receive at least one phishing email per day.

What is phishing? Simply stated, it’s an email or phone call from an organization posing as legitimate targeted at an ind...

July 4, 2016

Once a company sees the "handwriting on the wall" and starts the underwriting process for cyber insurance, they quickly find out that the insurance company underwriters have done their homework and are now questioning perspective customers if they have Multi-Factor-Aut...

Please reload

Featured Posts

Case Study: CPC Logistics Secures Sensitive HR Data in Vista HRMS

November 3, 2016

Please reload

Recent Posts
Please reload

Please reload

Search By Tags
Please reload

aPersona ASM utilizes machine learning, artificial intelligence (learning, problem solving and pattern recognition) and cognitive behavioral analytics to invisibly protect on-line accounts, web service portals & transactions from fraud.

  • Twitter App Icon
  • LinkedIn App Icon

© 2011 - 2020 aPersona, Inc. All rights reserved.