Entrust Identity On: Latest Posts

Weakly Guarded Businesses Can Expect Decline in Revenue (Part 1)

April 1, 2014 by Entrust, Inc. Leave a Comment

Businesses that aren’t properly guarded face diminished trust from their customer base.

Filed Under: Authentication Tagged:

Digital ‘Spring Cleaning’ Tips – Part 2

March 31, 2014 by Entrust, Inc. Leave a Comment
This entry is part 2 of 2 in the series Digital Spring Cleaning

This entry is part 2 of 2 in the series Digital Spring Cleaning Even the strongest organization-wide network security policy can leave end users exposed to threats. This security hole can lead to financial, legal, and productivity implications for the entire organization. Uneducated or unaware end users can fall prey to cyber attacks such as [Read More...]

Filed Under: General Tagged: phishing, spam

Cloud Security Necessary as its Popularity Increases

March 28, 2014 by Entrust, Inc. Leave a Comment

In a move that is sure to encourage more cloud migrations, two popular and competing cloud service providers have cut prices for customers.

Filed Under: Authentication, Cloud, Cloud Security Tagged:

Microsoft Warns of Malicious RTF Files, Remote Code Execution

March 27, 2014 by Entrust, Inc. Leave a Comment

On Monday, Microsoft issued a security advisory (2953095) notifying IT professionals and end-consumers of a vulnerability affecting “supported versions of Microsoft Word.” Per the advisory, specific rich text files (.RTF) that can be opened or previewed using many Microsoft software products, specifically Microsoft Word (2003-2013)and related service packs, could leave users vulnerable to remote code [Read More...]

Filed Under: General Tagged: rtf

Your Audit Report has Expired

March 27, 2014 by Bruce Morton Leave a Comment

Here is an interesting theme of questions we receive all the time. Why has your CA audit report expired? Or, when will your audit report be brought up to date? The answer? The audit report is up to date and a new audit report will be provided within three months of the end of the [Read More...]

Filed Under: SSL Tagged: CAB Forum, SSL, WebTrust

Border Security Strengthened by Automated Airport System

March 26, 2014 by Entrust, Inc. Leave a Comment

For busy travel hub Midway International Airport in Chicago, the recent implementation of automated kiosks will speed up travel time. 

Filed Under: Citizen eID, Government Authentication Tagged:

Digital ‘Spring Cleaning’ Tips – Part 1

March 26, 2014 by Entrust, Inc. Leave a Comment
This entry is part 1 of 2 in the series Digital Spring Cleaning

This entry is part 1 of 2 in the series Digital Spring Cleaning Unfortunately, end-users are often left out of the conversation when looking for ways to bolster security across the enterprise. A lack of training and education often play a big part in leaving end-users exposed to nasty forms of malware that can infiltrate [Read More...]

Filed Under: General Tagged:

How Can Financial Institutions Drive Better Risk Assessment?

March 25, 2014 by Entrust, Inc. Leave a Comment

Developing a strategic vision for securing online relationships with customers means making security choices that will address today’s requirements and can adapt to help meet tomorrow’s challenges. To realize this vision, it is necessary to carefully assess an institution’s online transactions and the level of risk presented by each type of transaction or user group. [Read More...]

Filed Under: Fraud, General Tagged:

Who Will Control ICANN?

March 24, 2014 by Bruce Morton Leave a Comment

Internet Corporation for Assigned Names and Numbers (ICANN) manages domain names for websites and email servers. To date, ICANN has been controlled by the U.S Department of Commerce; however, the contract will expire in September 2015. The U.S Department of Commerce has always overseen ICANN, but generally “rubber stamps” their approach. This matches the thought [Read More...]

Filed Under: General Tagged:

Authentication Strategy Can Help Fight Off University Data Breaches (Part 2)

March 20, 2014 by Entrust, Inc. Leave a Comment

Central Oklahoma and North Dakota join Indiana as universities impacted by malicious attacks.

Filed Under: Authentication Tagged: