
Author: Max Irzhak


Expert Insights Awards TypingDNA Best of Zero Trust Solutions, Plus 2 More Cybersecurity Categories
On April 12th, 2022, Expert Insights announced their “Best Of” Cybersecurity awards — declaring TypingDNA as the winner across 3 major categories. Expert Insights declared TypingDNA as the winner across 3 cybersecurity categories: Best of Zero Trust Security (ActiveLock) Best of Multi-Factor Authentication (Verify 2FA) Best of Biometric Authentication (ActiveLock and Verify 2FA) Expert Insights…
Cybersecurity Executive Order 14028: What You Need to Know for 2022
In May of 2021, the Biden administration took a big step toward modernizing the cyber defense of the United States. As a response to the growing number of high profile security breaches, President Biden signed Cybersecurity Executive Order 14028 “Improving the Nation’s Cybersecurity” — with the goal of protecting federal networks from cyber threats. It…
How the BPO Industry Safeguards Data When Employees Work Remotely
Prior to 2020, many in the BPO industry had never even considered working from home. In fact, most BPO companies historically operated out of an office with dedicated equipment and established security practices. But the pandemic changed all that, and now nearly 66% of employees say they’re not going back. With sensitive client data no…
Zero Trust Architecture: Learn the Basics & How to Build Your Defense
To understand zero trust architecture, you must rethink your mindset of cyber security. For years, security teams were guided by a simple code: “Trust, but verify.“ But with zero trust, security is far less laid back — guided by a more skeptical philosophy of “Never trust. Always verify.” In this article, we’ll walk you through…
What Is Multi Factor Authentication (MFA) and Why Passwords Are Not Enough
With cyber breaches making headlines seemingly every week, one thing is clear — passwords alone are no longer enough to keep us safe. While stopping all online crime is not a realistic goal, Multi Factor Authentication (MFA) is a simple but critical step in your security flow that can massively reduce the likelihood you or your…
Best Alternative to Twilio Authy based on price and UX
Twilio Authy is one of the most popular solutions for two-factor authentication. But just because something is popular doesn’t mean it’s without flaws. In particular, Twilio Authy has quite a few common pain points ranging from high prices to difficult user experiences. So if you’re on the search for the best alternative to Twilio Authy,…
Cheat Sheet: How to Choose the Right 2FA for Your Website
With the next cyber breach around the corner, having 2FA on your website is a no brainer. But which two-factor solution is right for you? There’s plenty to consider in making the right decision. Do you need high security or more convenience? Do you want a balance of both? With this 2FA guide, we’ll help…
How to secure remote access for employees working from home
How do you maintain secure remote access when employees work remotely? That was the million dollar question even before the COVID-19 pandemic forced millions of employees to transition to working from home — practically overnight. With more and more employees and contractors working remotely, the cybersecurity threats that organizations face have drastically changed. So how…