Find Us

Address
123 Main Street
New York, NY 10001

Hours
Monday—Friday: 9:00AM–5:00PM
Saturday & Sunday: 11:00AM–3:00PM

Archives

Categories

Meta

Category: ActiveLock Continuous Endpoint Authentication (CEA)

Department of Defense Zero Trust Model and How To Comply With It
InActiveLock Continuous Endpoint Authentication (CEA)Compliance RegulationsZero Trust

What is the Department of Defense Zero Trust strategy 2022, and how to comply with it?

The US Department of Defense Zero Trust strategy means increased security across all government bodies by giving no inherent trust to any user accessing apps, networks, or systems. The DoD Zero Trust strategy enables the transition from static, network-based security to a more dynamic collection of cybersecurity practices. Read on to find out what a…
How to secure BYOD devices with continuous endpoint authentication
InActiveLock Continuous Endpoint Authentication (CEA)Remote Workforce AuthenticationZero Trust

BYOD Security: Reducing Enterprise Risk With Continuous Endpoint Authentication

BYOD stands for Bring Your Own Device and is a practice in which personal devices are used to complete work-related tasks. BYOD has both pros and cons. On the one hand, BYOD can increase productivity and lower costs for enterprises and their employees. On the flip side, allowing contractors or employees to use their personal…
What are insider threats? Definition, types, threat cost and mitigation
InActiveLock Continuous Endpoint Authentication (CEA)Remote Workforce AuthenticationZero Trust

Insider Threats To Watch Out for With a Remote Workforce

Insider threats include individuals within an organization who purposely or by mistake expose company information. Because proprietary data, customer information, and trade secrets are the heart and soul of any enterprise, security systems and processes to reduce insider threats are essential. Surprisingly, most insider threats result from negligent employees, such as those working remotely, who…
Windows Defender for Endpoint Can Stop a Cyberattack, But Not Device Sharing
InActiveLock Continuous Endpoint Authentication (CEA)Remote Workforce AuthenticationZero Trust

Windows Defender for Endpoint Can Stop a Cyberattack, But Not Device Sharing

Windows Defender for Endpoint and similar antimalware/antivirus systems are all pretty good at analyzing incoming cyber threats that target endpoints, and responding to virus threats. But, what these systems fail at is providing visibility into whether the employee you trusted with that company endpoint is the one who’s actually accessing it throughout the entire workday —…
Remote call center equipment for customer data security
InActiveLock Continuous Endpoint Authentication (CEA)Remote Workforce Authentication

Working from home call center equipment to ensure customer data security

From laptops to headphones, call center employees working remotely require the right equipment to be successful. But working from home presents an even bigger challenge: sensitive customer data is now spread across thousands of company laptops — so knowing who is accessing your company’s devices at all times becomes increasingly important.  Below, we explore why…
InActiveLock Continuous Endpoint Authentication (CEA)Press ReleaseVerify 2FAZero Trust

Expert Insights Awards TypingDNA Best of Zero Trust Solutions, Plus 2 More Cybersecurity Categories

On April 12th, 2022, Expert Insights announced their “Best Of” Cybersecurity awards — declaring TypingDNA as the winner across 3 major categories.  Expert Insights declared TypingDNA as the winner across 3 cybersecurity categories: Best of Zero Trust Security (ActiveLock) Best of Multi-Factor Authentication (Verify 2FA) Best of Biometric Authentication (ActiveLock and Verify 2FA) Expert Insights…
InActiveLock Continuous Endpoint Authentication (CEA)Remote Workforce Authentication

Enhancing next-generation security with continuous authentication: XDR explained

As cyber threats have evolved, so has the security landscape — with incredible resources being allocated to protect company assets and keep bad actors at bay. Endpoint security today has seen a transition from endpoint detection and response (EDR) to extended detection and response (XDR), which pushes the capabilities of EDR and offers holistic protection for endpoints, networks, and enterprise workloads.
InActiveLock Continuous Endpoint Authentication (CEA)Remote Workforce Authentication

How the BPO Industry Safeguards Data When Employees Work Remotely

Prior to 2020, many in the BPO industry had never even considered working from home. In fact, most BPO companies historically operated out of an office with dedicated equipment and established security practices. But the pandemic changed all that, and now nearly 66% of employees say they’re not going back.  With sensitive client data no…