CIO Influence
CIO Influence News Networking Security

Keyavi Data Shares Best Practices for Keeping Data Private as a Champion of Data Privacy Week

Keyavi Data Shares Best Practices for Keeping Data Private as a Champion of Data Privacy Week
How to Implement Multi-factor Authentication Successfully and Share Data Securely

Keyavi Data Corp., a cybersecurity trailblazer whose game-changing technology is stopping cybercriminals in their tracks and reshaping the very nature of the data security industry, today kicked off its observance ofย Data Privacy Weekย by issuing a set of best practices for keeping personal and business data out of criminal hands using multi-factor authentication (MFA).

โ€œPoor password hygiene habits are still very commonplace, and compromised credentials are one of the top causes of data breaches, costing companies millions of dollars annually,โ€ says T.J. Minichillo.

Theseย โ€œBest Practices for Keeping Data Privateโ€ย explain why MFA remains one of the best defenses for mitigating password risk and preventing cyber criminals from exploiting user credentials. The tips โ€”ย available at Keyaviโ€™s site hereย โ€” also provide guidance on choosing the right MFA option to prevent unauthorized users from accessing personal or corporate data.

Top iTechnology Security News: Symphony Technology Group Announces Gee Rittenhouse Appointment to CEO of McAfee Enterprise

โ€œPoor password hygiene habits are still very commonplace, and compromised credentials are one of the top causes of data breaches,ย costing companies millions of dollars annually,โ€ said T.J. Minichillo, Keyaviโ€™s chief information security officer and VP of cyber threat & intelligence.

More than a third of Americans admit to sharing their password with others, while a majority use the same login for more than one account, according toย Security.org. Both practices can seriously compromise online security.

โ€œTodayโ€™s cybercriminals have tools to crack even complex passwords in seconds, which is why MFA is an increasingly important means for validating user identities,โ€ Minichillo added. โ€œUsed correctly, it can provide an additional layer of security to prevent opportunistic threat actors from compromising credentials, even if those credentials are exposed during phishing campaigns, brute force attacks, keyloggers, credential stealing malware incidents or many other types of sophisticated cyber intrusions.โ€

As the COVID-19 pandemic continues, and an unprecedented number of people continue working remotely, it is vital that companies reduce their cyber attack surface across every endpoint, including data stored in the cloud.

Top iTechnology Cloud News: Penguin Computing Partners with Meta to Help Build Toward the Metaverse by Delivering AI-Optimized Architecture

Phishing attacks increased 11% last year, according to Verizonโ€™sย 2021 Data Breach Investigations Report, which increases the likelihood of a userโ€™s credentials being compromised and exploited by threat actors. The latestย IBM-Ponemon Institute studyย also found that data breach costs hit a 17-year high, costing companies an average of $4.24 million per incident. Another report fromย The Identity Theft Resource Centerย states that the number of security compromises increased more than 68% in 2021, setting a new record.

As the cybersecurity landscape evolves, threat actors are also developing increasingly sophisticated social engineering schemes to circumvent security protocols, tools and services โ€” making it even more difficult for the average user to identify and defend against cyber threats.

Protecting data not only improves security, it also pays off financially, a recentย Cisco studyย found. Organizations investing in data privacy gain benefits such as greater agility, increased competitive advantage and greater customer trust that far outweigh the cost of their investment.

Top iTechnology Networking News: Balbix Appoints Chris van Staden as Chief Revenue Officer

In 2020, Keyavi unveiled breakthrough technology that is shattering antiquated, preconceived IT notions about data security. This industry-leading technology embeds every piece of data with so much intelligence it automatically thinks and protects itself wherever it travels or is stored during its entire life cycle. Multilayered security is infused into every piece of data at the data level so that no single layer can be compromised without triggering protection mechanisms in the surrounding layers. Data infused with Keyaviโ€™s patented technology knows where itโ€™s supposed to be and where it isnโ€™t, when it should open up or stay locked down, and to report back to its owner in near-real time who has it and what device itโ€™s on.

Earlier this month, the company released anย enhanced 2.0 product suiteย with new, single sign-on and account management capabilities that enable global enterprises to share and manage their data with employees and third parties seamlessly and securely on any device, anywhere, at any time. As a result, enterprises can quickly and securely authenticate user identities and grant or change policy permissions for access to business data on the fly.

No longer do files have to exist behind a firewall to be protected from cybercriminals or accidental loss. Now data itself IS the fortress, delivering the ultimate in peace of mind to Keyaviโ€™s customers.

Top iTechnology Automation News: BigPanda Announces Global Expansion and Midsize Enterprise Presence Fueled by Explosive Demand for AIOps

[To share your insights with us, please write toย sghosh@martechseries.com]

Related posts

Rubrik Acquires DSPM Leader Laminar to Accelerate Cloud Data Security

CIO Influence News Desk

42Crunch Strengthens Strategic Leadership with New Board Appointments

Business Wire

Asia Pacific Spending on IT, Business Services Exceeds US $3B in a Quarter for First Time

CIO Influence News Desk

Leave a Comment