Get the inside scoop with LoginTC and learn about relevant security news and insights.
FIDO2 Authentication with Windows Logon and RDP is here
November 29, 2023 •
LoginTC’s latest product update brings phishing-resistant FIDO2 authentication to the Windows Logon and RDP Connector. This innovative use of security key authentication is game-changing for administrators who want complete peace of mind over their multi-factor authentication (MFA) operations. Keep reading to learn what this update means for FIDO2 authentication at LoginTC. What is FIDO2 Authentication? […]
Major Update to our On-Premises MFA Solution: LoginTC Managed
November 28, 2023 •
We’re excited to announce a major update to LoginTC Managed, bringing several popular LoginTC Cloud features to our on-premises security solution. This product update enhances the user experience while maintaining the highest level of security standards. LoginTC Managed offers the control of an on-premises security solution with the ease of set up and support of […]
How to securely authenticate without a smartphone
November 14, 2023 •
Welcome back to our series on authentication use cases. As a refresher, this series is about learning what authentication solutions are available to solve common and unique problems that arise from different authentication scenarios. In our first installment, we talked about offline authentication for Windows. This part of our series will explore scenarios where your […]
The Ultimate Guide to MFA for Cyber Essentials Certification
November 07, 2023 •
Introduction The Cyber Essentials Certification is a comprehensive program for businesses who want to improve their cybersecurity posture. As with recent updates to data privacy legislation, the requirements of the Cyber Essentials Certification can be confusing, especially when it comes to the specifics of cybersecurity tools and technology required to meet the certification. In this […]
How to use offline MFA for Windows Logon
October 30, 2023 •
Welcome to the first installment of our new blog series about authentication use cases. In this series we’ll showcase a variety of common and unique authentication scenarios, and recommended authentication solutions for each. This installment explores three different authentication scenarios where offline MFA with Windows Logon is needed, as well as the four different solutions […]
Data Privacy Legislation: What is it and how does it affect your company
October 02, 2023 •
As more of our personal and private information is stored and transmitted online, data privacy has become a major concern for individuals and businesses alike. In the United States, there have been numerous attempts to establish comprehensive data privacy legislation, but progress has been slow and often contentious. In this blog post, we’ll take a […]
Cyphercor Issued Push Authentication Patent
August 21, 2023 •
A statement from Diego Matute, CEO and Founder of Cyphercor Today I am thrilled to announce that Cyphercor has been issued the patent for creating the technology behind Push Authentication. Issued as Patent US11706212B2 in the United States, and CA 2857106 in Canada, the patent was first filed in 2014, when we invented push authentication […]
Get Fully Supported Cloud Deployments with the LoginTC RADIUS Connector
July 24, 2023 •
Last week we were excited to announce the launch of our latest major product update, the LoginTC RADIUS Connector 4.0.0. The new version of our RADIUS Connector comes with fully supported cloud deployments through the AWS and Azure stores. In this blog post, we’ll break down what each of those deployment possibilities look like, how […]
What is the LoginTC RADIUS Connector 4.0.0?
June 27, 2023 •
Starting in July of 2023, LoginTC will be rolling out our brand new LoginTC RADIUS Connector to all existing and new clients — the LoginTC RADIUS Connector 4.0.0. If you’re an existing customer of LoginTC, you can upgrade to the new connector by following our step-by-step upgrade guide. Keep reading to learn more about what […]
The Cost of a Bad MFA Implementation
May 29, 2023 •
If you’re considering implementing an MFA solution at your organization, you’re probably wondering what the cost of MFA is going to be, and what that price tag will include. IT departments are increasingly stretched thin, and getting company-wide buy-in for cybersecurity products can be a challenge. That’s why you need to find the MFA solution […]
May 02, 2023 •
As cyber attacks become more sophisticated, organizations are turning to multi-factor authentication (MFA) as a way to secure their systems and data. MFA adds an extra layer of security by requiring users to provide two or more factors of authentication before granting access. However, not all MFA solutions are created equal. To ensure that your […]
Learn how our new MSP Hub will save you time
April 14, 2023 •
As cybersecurity becomes top priority for a growing number of small and medium sized (SMBs) businesses, the need for outsourced IT has steadily increased. Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) are being asked to meet the rising demand for cybersecurity improvements. LoginTC is here to help IT providers meet that demand […]
Introducing: The MFA Gap Calculator
April 12, 2023 •
The MFA Gap Calculator is a new cyber risk assessment tool from LoginTC. It was designed to help IT Administrators determine the level of MFA protection across their organization. We designed the MFA Gap Calculator to be the most user-friendly MFA questionnaire in the industry. With simply-worded questions, built-in examples, and logical calculations that ensure […]
Cyphercor Achieves ISO 27001 Certification!
April 05, 2023 •
Cyphercor, the company behind LoginTC, is excited to announce that we have received ISO 27001 certification! This achievement represents the culmination of months of work and is a testament to our commitment to information security. As an authentication solution provider, we’re dedicated to providing our customers with the highest level of protection for their sensitive […]
MFA Assessments Unpacked Part 4: Finishing your MFA Assessment
April 04, 2023 •
In our last installment of our series MFA Assessments Unpacked, we dug into the meat of how to conduct an MFA assessment. Now that you’ve determined the scope of your MFA implementation and strength of your authentication types, it’s time to take action. These final two steps will show you how to address identified gaps […]
MFA Assessments Unpacked Part 3: Conducting Your MFA Assessment
March 28, 2023 •
In the previous part of our series, MFA Assessments Unpacked, we discussed how to prepare for your MFA assessment. This is to ensure none of your digital assets are missed and you’re aware of everyone who has access to them. This time, we’ll start conducting our assessment with the aim of identifying two key features […]
MFA Assessments Unpacked Part 2: Preparing Your MFA Assessment
March 21, 2023 •
In Part 1 of our series MFA Assessments Unpacked, we discussed what an MFA assessment is, and why you should do one. Today we’re going to break down the first two critical steps in conducting an assessment of your organization’s MFA implementation. These steps are part of the preparatory stage of an MFA assessment. Following […]
MFA Assessments Unpacked Part 1: What is an MFA Assessment?
March 14, 2023 •
In our introduction to this series on MFA Assessments, we talked about how there’s been increased scrutiny of cybersecurity policies in recent years. Answering dozens of MFA-related questions on cyber insurance applications, vendor assessments, security audits, and more, is now a regular part of many IT professionals’ jobs. Being able to answer these questions accurately […]
MFA Assessments Unpacked: An Introduction
March 08, 2023 •
Does your organization use multi-factor authentication? It seems like a straightforward question. You’ve likely had to answer a few dozen questions like it in the past few years. Between cyber insurance questionnaires, vendor applications, auditing checklists, and more, the demand and scrutiny on IT departments has grown. But what does the question really mean, and […]
More versatile authentication and administration with LoginTC’s latest product update
February 28, 2023 •
In our last major product update, we introduced new features to improve authentication security and administrator insights into your LoginTC accounts. Today we’re announcing our latest update to LoginTC that will enhance flexibility and versatility to your authentication solution. This update introduces a brand new authentication method, and more options for end-user enrollment. Let’s dive […]
What you need to know about the IRS’s MFA requirements
February 01, 2023 •
If you’ve managed federal tax information in the past few months, you may have noticed the introduction of multi-factor authentication to the process. As part of the IRS’s initiative to ensure tax professionals are protecting their client data, the IRS began mandating the use of MFA on critical infrastructure. In this article, we’ll dig into […]
Introducing LoginTC product updates to improve authentication security and administrator processes
December 20, 2022 •
It’s been another fantastic year here at LoginTC! From the launch of our on-premises MFA solution, LoginTC Managed, to the release of our unique cyber insurance-specific offering, LoginTC Assure, our product and development teams have been hard at work ensuring LoginTC is ready for modern cybersecurity demands. That’s why we’re excited to close out the […]
The MFA Requirements You Need to Know About
December 12, 2022 •
Multi-factor Authentication (MFA) is becoming more common by the day. The United States government recently announced that it would require MFA sign-in methods for all federal agency staff. Companies are now requiring that users sign in via MFA rather than just using a username and password, and many cyber insurance policies also require that you use MFA. […]
Everything you need to know about Australia’s new cybersecurity law
December 06, 2022 •
Last month, the Australian parliament passed a new cybersecurity law aimed at cracking down on increasingly harmful ransomware attacks and data breaches that have shaken the country in recent months. In this article, we’ll discuss what this new law contains, why it was created, and what ramifications it has for your organization. What is Australia’s […]
LoginTC Product Update: Push Number Matching
September 23, 2022 •
Here at Cyphercor, our focus is developing the best cybersecurity protection for your company. We believe that all organizations should have access to seamless, user friendly, secure, and well supported multi-factor authentication. We stay on top of cybersecurity trends and make improvements that keep our customers ahead of the cyber criminals. With that said, we […]
Why is LoginTC the simplest solution on the market?
June 22, 2022 •
With many MFA options on the market, it’s hard to know how to evaluate them all and decide which solution works best for you. One of the reasons our customers come to us is how easy and user-friendly LoginTC is to operate. You’ve heard us say that LoginTC can be set up in just one […]
Why the healthcare industry needs to think about cyber health too
May 26, 2022 •
The healthcare industry is at the top of the list in terms of high-risk industries for cyber attacks. There are a few reasons as to why this would be, and yes it’s exactly what you’re thinking of. Healthcare data holds information that is valuable to cyber criminals and with the industry moving towards more online […]
Why is MFA required for cybersecurity insurance?
May 16, 2022 •
Here at Cyphercor, we’ve been diving deeper into cyber security insurance and how MFA plays a big role in acquiring cyber insurance for new clients, or renewing an existing insurance policy for your company. As we’ve reported, implementing MFA is now a mandatory requirement to qualify for most cyber insurance policies available on the market. […]
Insights from the Cyber Insurance Innovation Conference 2022
April 27, 2022 •
Last week I had the pleasure of attending Intelligent Insurer’s virtual “Cyber Insurance Innovation 2022” conference, a two-day conference that brought together stakeholders from all different parts of the cyber insurance industry. Representatives from insurance companies, insurance brokers, Insurtechs, and cyber insurance marketplaces came together to discuss the recent challenges in the market over the […]
Does your MFA provider support offline Windows Logon and RDP authentication?
April 18, 2022 •
Are you a Windows user and need remote access to your laptop or desktop? With remote work continuing to permeate our workplaces, logging in remotely to a Windows system persists as a common and often insecure activity that users across the globe perform every day. Many administrators correctly want to add a layer of security […]
The World’s First Non-OTP Two Factor Authentication Chrome App: The LoginTC Chrome Extension
April 01, 2022 •
Did you know that LoginTC has a chrome extension?! This feature came out in 2015 and was the world’s first non-OTP two factor authentication chrome app! This feature is a breakthrough in the cybersecurity industry and was truly ahead of its time when it was released and yes, you guessed it, it works on Chrome […]
How To Protect Your Legacy System
March 22, 2022 •
Do you have an existing legacy system still connected to your active network? Perhaps an old financial system or database, something containing integral and sensitive information that either can’t be or is too difficult to port to a newer system. If you do, you’re not alone. It’s estimated that around 30% of an organization’s technology […]
Heightened Security Threats Call For Heightened Security Measures
March 11, 2022 •
Governments around the world are waking up to the threat of cyber crime. According to an executive order from the White House in May of last year, small improvements to their protection won’t cut it and instead need to make a bold change and make significant investments in order to protect the government and its […]
Supply Chain Data Breaches: Toyota Dealership
March 04, 2022 •
Imagine you’re the owner of a manufacturing company. You produce thousands of products a day and store valuable information on your servers. Then all of a sudden you get notified of a data breach from one of your suppliers and your information has been affected yet again. Scrambling to figure out the source, you’re losing […]
LoginTC Product update: UAC (Run as administrator) support is here!
March 02, 2022 •
Cyphercor is excited to announce the completion of our long-awaited update to our flagship product, LoginTC, to introduce support for protecting UAC (Run as administrator) functions on your computer. This is an addition to our Windows Logon and RDP Connector, which is available for all of our Business tier users. What is it? For over […]
The Future of Cybersecurity Insurance and MFA
February 28, 2022 •
On February 23rd, Cyphercor hosted a live webinar all about the future of cybersecurity insurance and MFA. Cyphercor’s CEO Diego Matute was joined by insurance broker Blair Hancock as panelists for the discussion. On the agenda we discussed three primary topics: How did we get to where the nature of cybersecurity insurance is today? What […]
How to make your employees part of the cybersecurity equation
February 11, 2022 •
Cybersecurity can be confusing for employees to understand. Often employees think of something that management has to worry about, and don’t realize they play an integral role in ensuring the security of the company they work for. They might think, where do I even start? Or how does cybersecurity affect me? What can I do […]
Why you need full MFA deployment to protect your company
February 04, 2022 •
The COVID-19 pandemic and the rise in employees working from home has prompted companies to think of more secure ways to keep their private information safe. Despite this shift in thinking, the majority of companies are only protecting certain departments with MFA rather than every user. “Not putting MFA on all of your applications is kind of […]
Why you shouldn’t ignore the social media factor when protecting your business from hackers
January 27, 2022 •
Imagine this, you’re taking a break from work and scrolling through Facebook when you receive a message from a friend about a video that went viral and you’re in it. Curiosity kicks in and you think “what video?” and so you click the link, and at first everything is fine. You see it was a […]
How many five-letter cybersecurity words can you name?
January 19, 2022 •
The Wordle craze has taken the internet by storm, and knowing your cybersecurity lingo could help you figure out the daily word puzzle more than you realize.
How the ransomware epidemic is affecting your company, even when you don’t get hit.
January 13, 2022 •
While the world limps through yet another brutal wave of the COVID-19 pandemic, a quieter epidemic continues to rise: the ransomware epidemic.
January 06, 2022 •
This year at Cyphercor, we’re taking a close look at cybersecurity trends for 2022 and what we can expect in the industry.
December 14, 2021 •
In light of the public disclosure of the Log4j vulnerability (CVE-2021-44228), our security team has performed a thorough review of the use of logging libraries in LoginTC products.
Cybersecurity Insurance and MFA Attestations: Everything You Need To Know
December 13, 2021 •
Has something like this happened to you recently? Your cybersecurity insurance is up for renewal, or perhaps you’re looking into purchasing some for the first time following a ransomware attack, and your insurer comes back to you with a surprising answer: fill out this MFA attestation form, or your premiums are going up. Depending on […]
What’s on your cybersecurity wish-list?
December 06, 2021 •
This year at Cyphercor, we’re taking a close look at cybersecurity trends for 2022 and what we can expect in the industry.
Is an on-premises 2FA solution right for you
November 18, 2021 •
We’re taking a look at what on-premise technology is, how it differs from cloud technology, and how it could be beneficial to your business.
Introducing Our New On-Premises Solution: LoginTC Managed
November 04, 2021 •
LoginTC Managed is a fully on-premises two-factor authentication solution that adds a layer of MFA to any RADIUS speaking service. Read more about how our on-premise solution can help your business stay secure.
Cybersecurity Awareness Month: How You Can Phight the Phish
October 14, 2021 •
Cybersecurity awareness month is here! Learn more about how to protect yourself from phishing scams using 2fa systems.
October 06, 2021 •
October marks Cybersecurity Awareness Month and this week’s theme is being cyber safe! Read more about how you can stay cyber safe both at work and at home!
“6 Barriers To Implementing 2FA and How To Overcome Them” Webinar Recap
October 01, 2021 •
Missed our webinar? Don’t worry we got you covered. We outlined everything you need to know about implementing 2fa. Learn more today!
Data Breaches in the Manufacturing Industry
September 15, 2021 •
Data breaches and two factor authentication, how an extra layer of security can save your company millions and not slow down production. Learn more!
Two Factor Authentication: Data Hacks and Breaches
September 08, 2021 •
Two Factor Authentication, how it can protect your company’s information from hackers and data breaches. Learn more! Learn more
5 Back-to-work Cybersecurity Tips
July 13, 2021 •
If you listen closely, you’ll hear the sound of millions of workers returning to the office after a long hiatus working from home.
Why Radio Stations Need Cybersecurity, And What They Can Do To Protect Themselves
May 14, 2021 •
You might already be thinking, “radio stations, really?’ Surely banks or multi-national corporations like Amazon or even accounting firms would be more of a target for cyber attacks than a station playing tunes and sharing the latest news.
Hackers Are Pinpointing Accounting Firms, Leading To Identity Theft. Here’s How To Get Protected
April 05, 2021 •
How would you feel if the person you trust most gave all your personal and financial information to someone else behind your back? Pretty angry, right?
March 11, 2021 •
Think cybersecurity is only for companies like Amazon, Equifax, and Sony? Think again.
Amazon and Walmart’s Not-So-Secret Weapon Against Cyber Attacks
March 05, 2021 •
What do Amazon and Walmart have in common? Besides being industry-leading Fortune 500 multinationals, they both understand the importance of 2-Factor Authentication (2FA)
Why MFA & Professional Liability Insurance (Cyber Insurance) Go Hand-In-Hand
January 12, 2021 •
Multi-factor authentication (MFA) could reduce the cost of your insurance
The Hard Truth About Cyber Security
September 12, 2018 •
Everyday prominent companies are making news headlines about security breaches, LoginTC has the answer to maturing your security stature
Chinese Company Installs Backdoor on Android Devices
August 29, 2018 •
BYOD and Two-Factor authentication
How Formula 1 Utilizes Remote Access & the Importance of Network Security
August 14, 2018 •
Two-Factor authentication can help boost your cyber security strategy
Cost Implications To Lack of Cyber Security
February 17, 2017 •
Real dollar losses when two-Factor authentication is not considered
Google’s Warning of Hacking Group Involvement
January 05, 2017 •
Two-Factor authentication can help protect your account
Cyphercor Awarded with Federal Government Contract
December 10, 2016 •
LoginTC is pleased to announce it has been awarded a contract with the Canadian Federal Government
LoginTC Becomes an Official Partner of WatchGuard
December 09, 2016 •
LoginTC is pleased to announce our official partnership with WatchGuard. WatchGuard is one of the leading competitors of advanced network security, including firewall and threat management solutions
NIST No Longer Accepts SMS as a Two-Factor Authentication Method
November 30, 2016 •
LoginTC is pleased to announce our official partnership with WatchGuard. WatchGuard is one of the leading competitors of advanced network security, including firewall and threat management solutions
Why WatchGuard administrators use LoginTC two factor authentication to protect their networks?
June 29, 2015 •
WatchGuard administrators leverage documentation and performance of LoginTC two-factor authentication to protect their networks.
Top 3 reasons to avoid SMS when choosing a 2-factor authentication provider
May 15, 2015 •
The majority of smartphone-based two-factor authentication (2FA) providers today use SMS to deliver second factor codes or one-time passwords to users. Here’s why they shouldn’t.
Cyphercor named Top 20 Most Promising CA Technology Providers
April 29, 2015 •
CIOReview has awarded Cyphercor with the distinction of Top 20 Most Promising CA Technology Providers of 2015 for its flagship product LoginTC.
Why you won’t believe the response to our native app for BlackBerry 10
April 15, 2015 •
LoginTC’s recent release of a native app for BB10 resulted in a remarkable response from the BlackBerry community and beyond.
Introducing LoginTC Chrome: World’s first non-OTP 2-factor authentication Chrome app
April 08, 2015 •
In a cybersecurity breakthrough, Cyphercor Inc. releases the first ever non-OTP (one-time password) based two-factor authentication app for desktops and laptops via Google Chrome.
SC Magazine awards LoginTC near perfect score
April 02, 2015 •
SC Magazine has awarded LoginTC with a glowing product review and rating of 4.5/5 stars.
March 24, 2015 •
Phishing attacks remain pravelent and continue to increase in sophistication. In this blog, we focus on SMiShing, SMS-based phishing attacks. Learn how to protect yourself with two-factor authentication.
Top 5 reasons hard tokens are hard to manage
March 16, 2015 •
Hard Tokens are the most common method of 2FA deployment. But that doesn’t make them the best method. Here are 5 reasons why hard tokens are hard to manage!
How to set up your VPN with LoginTC 2FA
March 05, 2015 •
Enabling two-factor authentication for your VPN is simple with LoginTC. Here’s how to set it up.
How VPN admins & security managers use LoginTC to protect their networks
February 25, 2015 •
Some insight into how VPN administrators and security managers are currently using LoginTC two-factor authentication to protect their networks.
The need for contextual information within multifactor authentication
February 19, 2015 •
LoginTC seamlessly incorporates contextual information into its 2FA system for real-time threat detection / fraud alert.
The new tool that’s making 2 factor auth for VPNs easier
February 13, 2015 •
LoginTC’s latest innovation simplifies the process by which IT admins can install/configure two-factor authentication for their VPNs.
Go Phish! No matter what hand you’re dealt, all moves prove risky without 2FA
February 05, 2015 •
Phishing attacks remain prevalent, as they increase in sophistication. If you want protection, LoginTC two factor authentication is the solution.
January 28, 2015 •
Remote access to a Cisco (or any) VPN on a mobile device, such as a smartphone or tablet, using two-factor authentication (2FA) is simple with LoginTC. We break it down for readers in this blog.
More remote work, more risk: How two factor authentication can help
January 16, 2015 •
A survey by Regus anticipates more remote work in 2015. This blog explains why that means 2FA is necessary.
Heartbleed and Rethinking Session Management with Multi-Factor Authorization
May 05, 2014 •
Securing the communication link between user and the service is a good idea, but doesn’t go far enough.
Two-Factor Authentication Worldwide using LoginTC
April 02, 2014 •
How to provide secure access to internal and external applications worldwide
Enable Joomla with LoginTC Two-Factor Authentication
March 04, 2014 •
How to strengthen your Joomla website access control with LoginTC
Fundamental OTP Disadvantages & Problems in Two-Factor Authentication
January 14, 2014 •
Think one time passwords are a second factor? Think again.
Wearable Devices and the Future of Two Factor Authentication
December 18, 2013 •
“Something you have” doesn’t have to mean “Something you need to fish out of your bag”
Less is More: Our Latest LoginTC Product Update
December 11, 2013 •
Sometimes asking for a password is a security risk.
The Use of Secure Remote Password in LoginTC
December 06, 2013 •
How LoginTC uses the Secure Remote Password Protocol to increase security.
Passwords Are a Shared Problem
November 29, 2013 •
Password breaches are a shared problem – why two-factor authentication will prevail.
August 30, 2013 •
Any authentication should bolster security while keeping administrators and users happy and informed.
August 09, 2013 •
Learn how to use the LoginTC REST API to create LoginTC authentication requests and to programmatically manage your LoginTC account.
Simple Two-Factor Authentication for VPNs and remote access
July 15, 2013 •
Add an additional layer of security to your Cisco ASA, OpenVPN, Barracuda, Juniper and many more VPNs.
Role of Two-Factor Authentication in Regulatory Compliance and Industry Guidelines
March 19, 2013 •
Summary of regulatory compliance and guidelines related to two-factor authentication in the United States.
Connect Your Smartphone via VPN with Two Factor Authentication
March 04, 2013 •
How to enable Two Factor Authentication on your smartphone to access VPN connections.
Performance Analysis of Mobile Push Notification Networks
February 08, 2013 •
A discussion on the importance of mobile push notification networks to LoginTC and how we test and monitor the networks for performance.
Why Passwords Are No Longer Reliable
February 02, 2013 •
News of stolen passwords at the New York Times and Twitter allow fraudsters to access user accounts and emails.
January 18, 2013 •
Announcing a new feature for all of our domains.
LoginTC Differentiators From Other Two Factor Authentication Solutions
January 11, 2013 •
A frequent question Cyphercor has to address from potential customers and prospects is regarding LoginTC’s differences from other two-factor solutions in the marketplace. In this blog post we go over some of these differentiators.