No More Wait and See
When RSA was breached in March, experts said that it was likely that the hackers were not after RSA, but would use the stolen data as a means to a different end. With revelations over the Memorial Day weekend that several defense contractors were hacked, that appears to be the case. The RSA breach was, in effect, stealing keys from the locksmith in order to break into every house in town.
It is still not clear exactly what was taken during the breach in March. It is apparent that it was enough to give the hackers access to several strongly defended corporations within a few months. At the time of the RSA breach we asked what the impact to a business would be if every token was rendered useless. That is no longer a hypothetical question. In response to their own hack, Lockheed Martin is issuing new tokens to thousands of employees and contractors and during this time the users have no remote access to company systems.
When faced with a disruption in enterprise security, businesses cannot wait weeks for a solution, or be forced to upgrade services to correct the problem. Without a clear understanding of what was stolen or an announcement of specific fixes to the technology, where is the assurance that the upgrade will work?
Instead of getting the newest version of more of the same, ensure that your system access is protected with a multifactor solution that isn’t susceptible to the same risks. A flexible platform helps you switch high risk transactions from one second factor authentication method to another to maintain business continuity. Easily switch from legacy tokens to tokenless SMS based system or to Voice Biometrics, where your unique voice print is your second authentication mechanism.
To learn more about protecting your business against hackers, contact our specialists.
Recommended For You
Fraudsters are a smart group. With each fraud prevention method that’s introduced, they figure out ways to work around it. […]
On February 9, 2016, the President implemented the Cybersecurity National Action Plan (CNAP) designed “to enhance cybersecurity awareness and protections, protect […]
Companies have spent a great deal of time and money protecting their core systems and infrastructure from cyber attacks — hardening […]
Should people share their web site credentials with their spouses? How about their Significant Others? According to a study on […]