
Author: Alexandra Daragiu


Working from home call center equipment to ensure customer data security
From laptops to headphones, call center employees working remotely require the right equipment to be successful. But working from home presents an even bigger challenge: sensitive customer data is now spread across thousands of company laptops — so knowing who is accessing your company’s devices at all times becomes increasingly important. Below, we explore why…
HIPAA compliance checklist for remote employees in 2022
With rising cyber threats and more people working from home, securing endpoint devices has never been more critical. In the healthcare industry, the Health Insurance Portability and Accountability Act (HIPAA) protects private and sensitive patient data by requiring organizations handling healthcare information to pay closer attention to their protocols and institute airtight security safeguards. Hospitals,…
If Using Facial Recognition Software for Workforce Authentication, STOP
When the pandemic forced millions of employees to suddenly work from home, it came at a huge cost to company security — leaving IT security teams unprepared to scale their data security responsibilities. To protect their companies, some turned to stricter protocols to better monitor internal threats, including verifying employee identities with facial recognition software….
Typing patterns and the type-to-output tool
Typing patterns are the digital representation of a person’s unique typing behavior, similar to physical biometrics such as fingerprint recognition, facial recognition, and iris scanning.
TypingDNA’s typing biometrics authentication is now integrated with the ForgeRock Identity Platform
The ForgeRock-TypingDNA partnership aims to deliver user-friendly and secure customer and workforce authentication experiences. The integration of TypingDNA’s authentication API enhances security by preventing account takeovers as an integral part of holistic risk-based authentication (RBA) and two-factor authentication (2FA) systems.
Tremend launches observED, a Moodle plugin for automated proctoring, using TypingDNA typing biometrics
The observED app leverages Tremend’s software solutions that analyze data from embedded video cameras and browsing history, as well as users’ typing behavior and device-interactions, powered by TypingDNA’s typing biometrics technology.
InSCA/PSD2
3-D Secure with keystroke dynamics for PSD2 compliance
All in all, deploying keystroke dynamics within the 3-D Secure protocol can be the right move for merchants, banks, and payment issuers to become PSD2-compliant in a quick, secure, and user-friendly way.
How to prevent credential stuffing with keystroke dynamics authentication
Check out these two quick ways on how to use keystroke dynamics authentication to prevent credential stuffing and secure your customers’ information in a user-friendly way.
Despite BFSI request for SCA delay, deploying keystroke dynamics is the right move amid COVID-19 cyber threats
Cyberattacks are on the rise in the COVID-19 era. Despite BFSI push to delay SCA, secure your systems with keystroke dynamics authentication today.
A guide to proctoring and student identity validation with keystroke dynamics
Deploy student identity validation with keystroke dynamics to maintain the integrity of your assessments and protect the reputation of your institution in a privacy-friendly way.
User-friendly authentication for online payments
Typing biometrics, a behavioral-based technology, can prevent online payment fraud and provide user-friendly authentication for online payments.
RSA Conference: community, collaboration, and the future of cybersecurity
We share thoughts about our experience at the RSA Conference, the main topics we discussed, and how those topics relate to our company’s mission.
Why banks should deploy keystroke dynamics authentication
Banks should deploy keystroke dynamics as a modern security method to provide seamless authentication and to drive technological innovation.
TypingDNA’s review of 2019 and goals for 2020
Read more about TypingDNA’s vision and objectives, including a short review of our best moments in 2019, and plans for the journey ahead in 2020.
How quickly can TypingDNA recognize you?
You can count on TypingDNA’s typing biometrics to recognize typing behavior with great confidence, depending on what typing pattern you choose to use, as well as the size, and the number of typing samples enrolled for a user profile.
FAQs – Why TypingDNA’s typing biometrics authentication is highly-accurate?
Highly-accurate typing biometrics authentication can be used to protect users’ accounts. Read about how TypingDNA ensures the accuracy of the technology.
Intelligent authentication – a competitive advantage for challenger banks
Challenger banks can use intelligent authentication to comply with regulations and to develop a competitive advantage against competitors.
FAQs – Why MFA prevents fraudulent enrollment?
Using MFA (multi-factor authentication) securely prevents fraudulent enrollment and safeguards against fraudulent access to accounts.
User-friendly authentication to comply with CCPA
To comply with the California Consumer Privacy Act, companies should put user-friendly authentication into practice during login to prevent data breaches.
Fighting facial recognition wildfires with substitute technology
Less invasive biometrics such as typing biometrics and fingerprint scans can be a reliable, sound option for the future of identity validation.
FAQs – How do we ensure customers’ privacy?
Companies must ensure customers’ privacy, at all costs. We value the privacy of our users the most, for any information, feel free to contact us.
4 takeaways from How to Web conference
Defining a north star metric, keeping things simple and making data-driven decisions are some of TypingDNA’s takeaways from How to Web conference.
TypingDNA mentioned in Gartner’s Magic Quadrant for Access Management as a partner to Optimal IdM
TypingDNA is mentioned in Gartner’s Magic Quadrant for Access Management* as a partner to Optimal IdM.
FAQs – If your typing pattern changes, can you still be authenticated?
We recommend at least one additional security factor to be put in place, so in case your typing pattern changes, you will still be able to log in.
FAQs – What is typing biometrics?
What is typing biometrics technology? It is embedded in peoples’ transient behavior when typing on a keyboard. See how it works, here.
InMFA
A quick guide to choosing multi-factor authentication methods
In a world with an increasing amount of cyber threats, the question posed is no longer whether we need authentication. The real question is how to choose the right MFA methods to suit your security needs, and this is the focus of this blog post.
A review of the evolution of multi-factor authentication (MFA)
The evolution of MFA methods changed the face of cybersecurity. Technological developments promise affordable and user-friendly MFA.
Typing biometrics for secure and frictionless multi-factor authentication (MFA)
Leveraging typing biometrics with almost any other factor of authentication allows for frictionless and affordable online privacy protection.