<img src="https://secure.leadforensics.com/32105.png" style="display:none;">

Cybersecurity News, Advice and Opinion

Three Mobile Hacked: Insider Threat Puts Details of 6 Million Customers at Risk

Posted by Norman on Nov 22, 2016 2:40:08 PM

Three Mobile have admitted suffering a data breach, a breach that could put at risk the personal details of up to 6 million customers. The hackers successfully gained access to the Three Customer Upgrade Database by using an employee login. Three have admitted that details from 130,000 of their customers is known to have been stolen.

Read More

The Hidden Risk of Legacy App Authentication

Posted by My1Login on Oct 3, 2016 4:47:13 PM

The migration towards cloud applications and away from in-house legacy desktop applications is a trend fundamentally driven by the lower total cost of ownership web solutions offer. New cloud alternatives are replacing on-premise solutions, but it is not happening overnight. The prospect of replacing all on-premise applications with cloud solutions in one fell swoop would bring most organisations to a standstill, so while the ultimate goal for many companies is to migrate to the cloud, the reality is that there will be a mix of cloud and legacy applications in use for the foresable future.

Read More

InfoSec Threat in Wake of Yahoo Hack

Posted by Norman on Sep 27, 2016 5:25:49 PM

Half a billion user records have been stolen from Yahoo, in what the company have called a "State Sponsored" hack. Yahoo's belief that it's the victim of a state sponsored hack has been questioned by some commentators, not least Yahoo's former engineering Infosec chief, Jeremiah Grossman, who suggested that  "State-sponsored adversaries don’t typically publicly share stolen data or sell it".

Read More

My1Login Press Release - September 2016

Posted by My1Login on Sep 12, 2016 12:00:51 PM

Copy of My1Login Press Release (Sept 2016)

Read More

The UK's Top 10 Data Breaches

Posted by My1Login on Sep 9, 2016 2:17:42 PM

Data breaches make the headlines when they affect big brands, but 90% of all large organisations now admit to having been hacked*. While the average cost of a data breach is not pocket change at £2.3m, the biggest damage is reputational – for both the company and the C-Level execs who take the blame and lose their jobs.

With the last 12 months being a bumper year for hacks, we wanted to take a look back at the 10 most disastrous UK data breaches, spanning the last 10 years:

Read More

US Security Firm Breached - Hacker Finds 'Secure Data' Stored in Clear Text

Posted by My1Login on Aug 31, 2016 3:27:00 PM

It’s been reported there has been a security breach at one of our competitors, OneLogin, where a hacker has been able to access customer 'Secure Notes'.

Read More

My1Login Press Release - August 2016

Posted by Norman on Aug 18, 2016 3:37:02 PM

Copy of My1Login Press Release (August 2016)

Read More

Counting the Cost of a Data Breach – Accountancy Firm Sage Hacked

Posted by Norman on Aug 15, 2016 5:24:08 PM

Accountancy software firm, Sage, has suffered a data breach, in which "personal details and bank account information for employees of as many as 300 large UK companies may have been compromised."

Sage announced that they were "investigating unauthorised access to customer information using an internal login”. City of London police are currently investigating to determine who was responsible.

Read More

My1Login Selected as Supplier to UK Government

Posted by Norman on Aug 8, 2016 3:50:18 PM

We are delighted to announce that My1Login has been selected as a G-Cloud 8 supplier – the UK Government procurement framework for public-sector bodies.

My1Login’s Identity & Access Management solution is now available to procure through this latest framework agreement on the Digital Marketplace.

Read More

The Ticking Time Bomb of Abandoned Accounts

Posted by My1Login on Jul 28, 2016 1:35:39 PM

Data breaches where user credentials have been stolen and leaked online are all too common, and the aftermath follows the same pattern. The Service Provider will investigate, invalidate the affected login credentials and require users to reset passwords. But, what happens when credentials are stolen from applications that are no longer in use in your organisation, applications that were probably long abandoned? There's no action required and no need to be concerned, right?

Read More

Check Out Our White Papers



Subscribe to Email Updates