Article posted: Aug 21, 2017
By Yvonne Möbius, HR, Versasec
U.K.-based analyst firm Juniper Research estimates criminal data breaches will cost businesses more than $8 trillion over the next five years. Juniper's new research report, "The Future of Cybercrime & Security: Enterprise Threats & Mitigation 2017-2022," also states that personal records stolen by cybercriminals will reach 2.8 billion in 2017 and almost double to 5 billion in 2020, despite new security technologies to thwart cyberattacks entering the market.
Article posted: Jul 10, 2017
By William Houry, Vice President of Sales
No matter the industry or its level of security, at least some employees at every enterprise today require access to their corporate networks via mobile devices. Most rely on physical smart cards for user authentication and access, yet there's another low-cost and even simpler solution: Just-in-Time (JIT) virtual smart cards (VSCs) (find more information about smart cards here: https://versasec.com/smart-cards.php).
Article posted: Aug 18, 2016
By Joakim Thorén, CEO
Small- and medium-sized businesses today are firmly in the sights of hackers. And, unfortunately, password protection alone simply is not good enough to keep data safe.
Article posted: Mar 30, 2016
We've released the findings from our first annual Versasec Security Survey, which polled IT security professionals around the globe on their security concerns and spending habits for 2016. Lots of SMEs participated, with nearly 75 percent of the respondents saying they work for companies with fewer than 1,000 employees.
Article posted: Mar 28, 2016
Whether you're an existing Versasec customer, a prospective customer or someone who is interested in learning more about the identity and access management (IAM) space, we've got a video we'd like you to watch. It's educational, illuminating and even refreshing. Here's why:
Article posted: Jan 08, 2016
By William Houry, VP of Sales, Versasec
The year 2015 was rather illustrious for cyberattacks, with hacks both famous and even infamous. Among the most notable attacks – some for the sheer numbers of victims, some for who was hacked, and some for both – were the following: