The Evolution of Security #3: Safes
Information security is ever-evolving. Check out Duo's series depicting the evolution of security and learn how it has evolved into the data security methods in use today.
Information security is ever-evolving. Check out Duo's series depicting the evolution of security and learn how it has evolved into the data security methods in use today.
Information security has, by necessity, changed a lot from a strategic perspective. Check out Duo's series of illustrations depicting security throughout the ages, and stay tuned for our April 14 announcement!
Information security has, by necessity, changed a lot from a strategic perspective. Check out Duo's series of illustrations depicting security throughout the ages, and stay tuned for our April 14 announcement!
The entire chain of security starts at the top - enterprise-level companies that hire contractors, vendors and other third-parties must ensure their counterparts are operating at a sufficient level of security.
A new user-friendly toolkit targets online credentials in addition to one-time passwords used to complete two-factor authentication with the use of ‘remote overlay.’
In order to help healthcare providers meet e-prescription requirements as mandated by the U.S. Drug Enforcement Agency (DEA), Duo Security has added Epic’s electronic health record (EHR) software to its list of supported services.
Duo Security Presents...the Access of Evil. These miscreants want all your data and they’ve honed their skills to get access. These are their stories and villainous deeds of the past year - these are the different types of hacks to watch out for.
> Physicians and healthcare systems have been turning to the use of EHR (electronic health records) systems to digitally collect and store patient health information, as well as e-prescribe (eRx) controlled substances, an effort incentivized by recent U.S. government legislation.
The Adobe breach didn’t just affect individuals, but also companies, due to password reuse. We’ve set up a site where you can check the leaked Adobe data for affected users in your organization.
Hacking has remained a fine-tuned craft of the ages; from a breach of telegraph messages in 1903 to the Target breach of just late last year, our ideas of security have evolved, as well as our tactics.