SecurEnvoy's New Release Helps Businesses to Tackle Cybercrime
CIOReview
CIOREVIEW >> Security >>

SecurEnvoy's New Release Helps Businesses to Tackle Cybercrime

By CIOReview | Tuesday, August 4, 2015

NEW YORK, NY: As cybercrime is at its verge, SecurEnvoy, inventors of Tokenless two-factor authentication (2FA) is leaving no stone unturned to overcome the challenges. It has recently launched a unique security assessment for businesses to protect them from becoming a vulnerable prey of cybercrime. This new release will give an insight to organizations to mark the loopholes in their security process and how these can be tackled.

“Cybercrime is a clear and present danger. Business leaders cannot ignore the drastic impact a data breach can have on their company. Therefore, it is better to act now rather than after a breach,” says Steve Watts, Co-founder, SecurEnvoy. He further explains that in order to avoid danger, every organization must move from passwords or physical tokens to a tokenless approach using mobile devices. “With only one device used to authenticate with 2FA, this approach prevents password-only hacks, is more secure, less costly and more convenient than alternatives,” he concludes.

2FA is an extra layer of security that is known as “multi factor authentication”. It requires not only a password and username but also something that only that user knows.  This process makes it tough for hackers or cyber criminals to gain access to anyone’s personal data. It is built upon splitting process, where one part of the record is created locally on the customer’s server, and the other one is generated using specific characteristics of the mobile device. This result in split information; neither the user, nor the information security company has access to all of the data.  

Talking about this new security assessment and 2FA, Watts states, “Two-factor authentication enables organizations to quickly and easily introduce a robust, more secure remote access solution. Instead of issuing and managing separate physical tokens or remembering multiple passwords, mobile devices are easily used as identification tools.”