WWPass Login without Usernames and Passwords
by Gluu Team, on Fri 18 September 2020
Good security starts at the login screen. With the WWPass mobile app or token, users can easily log in to all their enabled applications without the need for inherently insecure username/password architectures.
Coming soon: Important updates in PassKey mobile apps
by WWPass Team, on Mon 03 August 2020
We're excited to introduce WWPass Key, a new version of your WWPass PassKey! Transition is seamless, secure, and your PIN stays the same.
WWPass Migrates From RSA to Elliptic Curves
by WWPass Team, on Mon 22 June 2020
RSA algorithms, while well established and widely used, are notorious for high computational power demands and ever-increasing requirements for a key length. Elliptic curves become more popular now with shorter keys and faster processing. The new algorithm also features uncompromising one-way encryption, essential for WWPass operations.
Zoom’s New End-to-End Encryption Is Great, But Still It Doesn’t Address Its Biggest Security Issue
by Daniel Waldman, on Mon 18 May 2020
Zoom recently acquired an end-to-end encryption company, beefing up their security. However, the service is still open to phishing, a primary attack vector for hackers. For corporate users the problem can be solved with properly implemented SSO and multi-factor authentication, which is not based on usernames and passwords. But individual and professional accounts still remain vulnerable.
The Dangers of Mobile Single Sign-on (SSO) and How WWPass Can Protect You
by Daniel Waldman, on Tue 18 February 2020
Single sign-on (SSO) has become a popular feature within corporate infrastructures, enabling users to quickly bypass typical security checks to get to applications. In fact, it’s become common for employees to use SSO along with their personal smartphones to log in to corporate applications. However, this scenario has some major security challenges that, if left unchecked, can spell disaster should someone get a hold of employees’ phones.
What You Need to Know about Two-factor, Multi-factor, and Strong Authentication
by Daniel Waldman, on Wed 06 November 2019
How can a company avoid dangerous and costly breaches? One essential method is ensuring that software systems containing sensitive business and customer information are secured with multi-factor authentication. There is a lot of confusion over what that means, though, and what is the difference between two-factor authentication (2FA), multi-factor authentication (MFA), and strong authentication. Let’s take a closer look at these terms to understand how a business needs to best protect its most sensitive assets.
What to look for when buying encryption solutions — 7 crucial tips
by Perry Chaffee, on Tue 15 October 2019
Find the right encryption solution & avoid common mistakes by learning what questions to ask. From encryption key storage ✅ & architecture ✅ to prioritizing security over compliance ✅, improving your understanding now can avoid costly problems later.
Why PassHub is the Right Alternative to KeePass
by Daniel Waldman, on Tue 03 September 2019
When it comes to password managers for IT teams, KeePass is one of the most popular. That said, KeePass has a number of limitations that counteract both its convenience and its security measures. Here’s a closer look at why PassHub warrants serious consideration if you’re looking for an alternative to KeePass for your IT team.
5 Reasons Your IT Team Needs to Beef Up Its Password Management
by Daniel Waldman, on Mon 19 August 2019
Whether you’re a small business or a Fortune 500 multinational corporation, information security should always be a top priority. Just last year, billions of digital records containing personal information were stolen through data breaches, causing tens of millions of dollars in damages. Compromised or hacked passwords are often at the root of security breaches. If that’s not reason enough to secure your company’s systems with a business password manager, here are 5 more reasons why your IT team should take steps to improve its password management.
How secure is your account with two-factor authentication codes
by Eugene Shablygin, on Wed 08 May 2019
If you wouldn’t give a surgeon’s knife to a lumberjack for chopping down a tree, or an axe to a surgeon for performing surgery, why would you require your users to login with usernames, passwords, and obsolete two-factor authentication when Right Factor Authentication is the right tool for making your online accounts secure?