Blog

Get the inside scoop with LoginTC and learn about relevant security news and insights.

  • Improved user experience and new language support in LoginTC’s latest update

    November 07, 2024Diego Matute

    At LoginTC, we’re committed to providing robust and reliable multi-factor authentication (MFA) solutions that adapt to your evolving needs. Building off our previous update, this update adds more flexibility for organizations with multiple domains, and introduces support for a new end-user language. Let’s dive into what’s new in this update! Display Name The new Display […]

    Learn more →

  • CJIS MFA Requirements: Everything you need to know

    October 31, 2024Victoria Savage

    As the new CJIS MFA requirements take effect, how can you ensure that your law enforcement agency remains in compliance with the CJIS Security Policy? Government entities like police stations, sheriffs offices, or other entities that access the FBI’s Criminal Justice Information Services must ensure that sensitive criminal justice information is handled with proper cybersecurity […]

    Learn more →

  • Data visualization and improved redundancy in LoginTC’s latest update

    October 15, 2024Diego Matute

    Today we’re excited to announce a major update to the RADIUS Connector. This update, LoginTC RADIUS Connector 4.1.0, brings a range of new features that will make MFA administration simpler and improve overall user experience. From data visualization to data resiliency, explore the newest features below. Dashboard Stats The LoginTC RADIUS Connector 4.1.0 introduces the […]

    Learn more →

  • How the Azure MFA requirement will affect your organization

    September 30, 2024Victoria Savage

    As security threats continue to evolve, Microsoft has updated its policies to introduce an Azure Multi-factor authentication (MFA) requirement that will ensure stronger identity and access management protection for administrator and user accounts. MFA is a proven tool to prevent cyber attacks and protect accounts from unauthorized access. In this post, we’ll explore what these […]

    Learn more →

  • What is the YubiKey vulnerability?

    September 10, 2024Victoria Savage

    The announcement of a YubiKey vulnerability is making headlines as researchers uncover a method for cloning the popular phishing-resistant security keys. But what does this vulnerability involve, and how much can it compromise your security? Continue reading to learn more about this YubiKey vulnerability. What is a YubiKey? YubiKeys are a type of security key […]

    Learn more →

  • How to use offline MFA for Windows Logon

    August 27, 2024Victoria Savage

    This blog series showcases a variety of common and unique authentication scenarios, and recommended authentication solutions for each. This installment explores three different authentication scenarios where offline MFA with Windows Logon is needed, as well as the six different solutions for these use cases. Check out one of our previous blogs about offline authentication with […]

    Learn more →

  • How to use MFA to prevent cyber attacks

    August 19, 2024Victoria Savage

    As an IT administrator, it’s likely you hear often that MFA can be used to prevent cyber attacks. You may be wondering if that is true, and how it works. In this article, we’ll go through what MFA is and some notable stories of when cyber attacks could have been prevented with MFA. By the […]

    Learn more →

  • How to protect offline backups

    July 25, 2024Victoria Savage

    Offline backups are a common security tool to ensure your organization can recover from ransomware attacks. Yet many organizations don’t know how to completely protect offline backups. In this article, we’ll unpack what an offline backup is, the ways to protect offline backups, and additional security measures you may not have considered. Table of Contents […]

    Learn more →

  • Global IT outage: What it is and how to fix it

    July 19, 2024Diego Matute

    Internet users around the world awoke on Friday to a global IT outage, impacting Windows devices everywhere from home offices and workplaces, to airports, banks, hotels, and more. What caused this outage and what can you do to get your systems back up and running? What is causing the Global IT outage? The outage appears […]

    Learn more →

  • Blast-RADIUS Vulnerability: How to protect your organization

    July 10, 2024Thomas Sydorowski

    What is the Blast-RADIUS Vulnerability? The Blast-RADIUS vulnerability was published by researchers on July 9, 2024, and it affects the RADIUS protocol, which is commonly used for authentication, authorization, and accounting (AAA) in enterprise and telecommunication networks. By exploiting flaws in the RADIUS protocol, a Man-in-the-Middle (MITM) attacker can trivially forge RADIUS requests and responses […]

    Learn more →

  • Fortinet 2FA Requirement: What your organization needs to know

    July 08, 2024Victoria Savage

    The popular VPN and firewall service provider, Fortinet, is taking a strong stance on security by enforcing the adoption of two-factor authentication (2FA) across its entire user base. Learn about the new Fortinet 2FA requirement and how to get your organization ready before the deadline. What is the Fortinet 2FA requirement? Starting on July 24, […]

    Learn more →

  • CDK Global Attack: How to protect your car dealership

    June 27, 2024Victoria Savage

    Cyber criminals are wreaking havoc on car dealerships across North America, as a popular software called CDK Global tries to recover from a ransomware attack. The attack has knocked out critical services for car dealerships, with no firm answer on when services will come back online. Learn more about the attack as well as information […]

    Learn more →

  • What is the Check Point VPN vulnerability?

    June 25, 2024Victoria Savage

    A new vulnerability in Check Point VPN is causing headaches for IT administrators around the world. In this post we’ll discuss what the new Check Point VPN vulnerability is, how it’s affecting people, and what you can do to protect your organization. What is the Check Point VPN vulnerability? On May 27, 2024 Check Point […]

    Learn more →

  • How to use LoginTC for Microsoft Entra ID External Authentication Methods

    June 17, 2024Diego Matute

    If you use Entra ID for your Office 365 and Microsoft online applications at your organization, you may be looking for more comprehensive multi-factor authentication (MFA) services than what Microsoft has to offer. That’s where the Entra ID External Authentication Methods option can help. In this article, you’ll learn all about Microsoft Entra ID External […]

    Learn more →

  • What is the Data Breach Impact Assistance Petition

    June 10, 2024Victoria Savage

    Learn about the Data Breach Impact Assistance petition, and how it can help improve cybersecurity legislation in Canada. What is the Data Breach Impact Assistance Petition? The Data Breach Impact Assistance petition seeks to improve cybersecurity legislation in Canada by compelling agencies and private companies in federally-regulated industries to provide mandatory identity theft prevention and […]

    Learn more →

  • Enhanced security for admins, more flexibility for end-users

    May 16, 2024Diego Matute

    Building off of the previous LoginTC update, this month’s update adds another authentication method that end-users are bound to love, as well as administrator security improvements that will help keep your most critical accounts safer. Keep reading to learn all the details about this latest update. Authenticator App Support LoginTC now offers support for third-party […]

    Learn more →

  • External authentication methods in Microsoft Entra ID

    May 14, 2024Thomas Sydorowski

    Microsoft has announced that external authentication providers will now be able to integrate natively into the Microsoft Entra ID platform. Microsoft has invited LoginTC to be an external authentication provider with Entra ID. Read on to learn more about what this means for your organization, and your MFA choices in a Microsoft environment. Why should […]

    Learn more →

  • Everything you need to know about Australia’s cybersecurity laws

    May 09, 2024Victoria Savage

    In the past year, the parliament of Australia has passed a new cybersecurity laws aimed at cracking down on increasingly harmful ransomware attacks and data breaches that have shaken the country since 2022. Australia now seeks to be a global leader in cybersecurity by 2030, and has introduced sweeping reforms tackling every part of the […]

    Learn more →

  • How to migrate from the Azure MFA Server

    May 03, 2024Victoria Savage

    Microsoft is depreciating their on-premises MFA solution, Azure Multi-Factor Authentication Server, starting September 30, 2024. If you’re an Azure MFA Server customer, you may be wondering what options there are for you to stick with a trusted on-premises solution for your MFA needs. In this blog post, we’ll explore what your options are for moving […]

    Learn more →

  • New authentication options, productivity tools, and more with LoginTC

    April 10, 2024Diego Matute

    2024 has seen massive new improvements to LoginTC’s offering, including new offline authentication options and security settings, as well as streamlined authentication management tools. The latest update to LoginTC offers administrators more of everything: productivity tools, customization settings, and a new way to authenticate. Explore each of the new features below. Phone Call OTP Try […]

    Learn more →

  • LoginTC CVE-2024-3094 Impact

    April 03, 2024Thomas Sydorowski

    In light of the public disclosure of the compromised xz library packages (CVE-2024-3094), our security team has performed a thorough review of the xz library packages in all LoginTC appliances to determine the CVE-2024-3094 impact on our services. Does CVE-2024-3094 impact LoginTC? No,  CVE-2024-3094 does not impact LoginTC Cloud services. Are the LoginTC appliances affected? […]

    Learn more →

  • On-Prem, On-Premise, or On-Premises? What do you call MFA software not deployed in the cloud?

    March 14, 2024Victoria Savage

    On-premises, on-premise, or on-prem MFA? Whatever you call it, this blog post explores what on-premises technology is, the different names for it, and how you can utilize it at your organization. What is an on-premises MFA solution? On-premises MFA software gives you the full functionality of a third-party MFA solution but with added control over […]

    Learn more →

  • Use hardware tokens offline and restrict bypass code settings in LoginTC’s newest product update

    February 29, 2024Diego Matute

    The latest product update from LoginTC offers a new offline authentication method, and gives Super Administrators more control over bypass code settings. Building on our previous product update, which improved the management of FIDO2 tokens and Passcode Grid, LoginTC continues to build features that put control back in the hands of administrators. Keep reading to […]

    Learn more →

  • Product update brings more streamlined authentication tools to LoginTC

    February 07, 2024Diego Matute

    LoginTC’s first product update of 2024 brings new usability features for more authentication methods. Last year ended with the announcement of FIDO2 compatibility in the Windows Logon and RDP Connector, and this year more updates for the FIDO2 authentication method are already here. Administrators can now leverage user-enrollment for FIDO2 tokens, as well as a […]

    Learn more →

  • How to protect your organization against Citrix Bleed

    December 20, 2023Victoria Savage

    Introduction The latest vulnerability affecting Citrix systems, known as Citrix Bleed, has emerged as a critical threat to the private data of organizations and individuals around the world. This critical security issue has impacted countless companies and individuals globally, emphasizing the need for better security measures. In this blog post, we will explore what the […]

    Learn more →

  • FIDO2 Authentication with Windows Logon and RDP is here

    November 29, 2023Diego Matute

    LoginTC’s latest product update brings phishing-resistant FIDO2 authentication to the Windows Logon and RDP Connector. This innovative use of security key authentication is game-changing for administrators who want complete peace of mind over their multi-factor authentication (MFA) operations. Keep reading to learn what this update means for FIDO2 authentication at LoginTC. What is FIDO2 Authentication? […]

    Learn more →

  • Major Update to our On-Premises MFA Solution: LoginTC Managed

    November 28, 2023Diego Matute

    We’re excited to announce a major update to LoginTC Managed, bringing several popular LoginTC Cloud features to our on-premises security solution. This product update enhances the user experience while maintaining the highest level of security standards. LoginTC Managed offers the control of an on-premises security solution with the ease of set up and support of […]

    Learn more →

  • How to securely authenticate without a smartphone

    November 14, 2023Victoria Savage

    Welcome back to our series on authentication use cases. As a refresher, this series is about learning what authentication solutions are available to solve common and unique problems that arise from different authentication scenarios. In our first installment, we talked about offline authentication for Windows. This part of our series will explore scenarios where your […]

    Learn more →

  • The Ultimate Guide to MFA for Cyber Essentials Certification

    November 07, 2023Victoria Savage

    Introduction The Cyber Essentials Certification is a comprehensive program for businesses who want to improve their cybersecurity posture. As with recent updates to data privacy legislation, the requirements of the Cyber Essentials Certification can be confusing, especially when it comes to the specifics of cybersecurity tools and technology required to meet the certification. In this […]

    Learn more →

  • Data Privacy Legislation: What is it and how does it affect your company

    October 02, 2023Victoria Savage

    As more of our personal and private information is stored and transmitted online, data privacy has become a major concern for individuals and businesses alike. In the United States, there have been numerous attempts to establish comprehensive data privacy legislation, but progress has been slow and often contentious. In this blog post, we’ll take a […]

    Learn more →

  • Cyphercor Issued Push Authentication Patent

    August 21, 2023Diego Matute

    A statement from Diego Matute, CEO and Founder of Cyphercor Today I am thrilled to announce that Cyphercor has been issued the patent for creating the technology behind Push Authentication. Issued as Patent US11706212B2 in the United States, and CA 2857106 in Canada, the patent was first filed in 2014, when we invented push authentication […]

    Learn more →

  • Get Fully Supported Cloud Deployments with the LoginTC RADIUS Connector

    July 24, 2023Diego Matute

    Last week we were excited to announce the launch of our latest major product update, the LoginTC RADIUS Connector 4.0.0. The new version of our RADIUS Connector comes with fully supported cloud deployments through the AWS and Azure stores. In this blog post, we’ll break down what each of those deployment possibilities look like, how […]

    Learn more →

  • What is the LoginTC RADIUS Connector 4.0.0?

    June 27, 2023Thomas Sydorowski

    Starting in July of 2023, LoginTC will be rolling out our brand new LoginTC RADIUS Connector to all existing and new clients — the LoginTC RADIUS Connector 4.0.0. If you’re an existing customer of LoginTC, you can upgrade to the new connector by following our step-by-step upgrade guide. Keep reading to learn more about what […]

    Learn more →

  • The Cost of a Bad MFA Implementation

    May 29, 2023Victoria Savage

    If you’re considering implementing an MFA solution at your organization, you’re probably wondering what the cost of MFA is going to be, and what that price tag will include. IT departments are increasingly stretched thin, and getting company-wide buy-in for cybersecurity products can be a challenge. That’s why you need to find the MFA solution […]

    Learn more →

  • 6 Must-Have MFA Features

    May 02, 2023Victoria Savage

    As cyber attacks become more sophisticated, organizations are turning to multi-factor authentication (MFA) as a way to secure their systems and data. MFA adds an extra layer of security by requiring users to provide two or more factors of authentication before granting access. However, not all MFA solutions are created equal. To ensure that your […]

    Learn more →

  • Learn how our new MSP Hub will save you time

    April 14, 2023Thomas Sydorowski

    As cybersecurity becomes top priority for a growing number of small and medium sized (SMBs) businesses, the need for outsourced IT has steadily increased. Managed Service Providers (MSPs) and Managed Security Service Providers (MSSPs) are being asked to meet the rising demand for cybersecurity improvements, including MFA. That’s why the MSP Hub is an essential […]

    Learn more →

  • Introducing: The MFA Gap Calculator

    April 12, 2023Victoria Savage

    The MFA Gap Calculator is a new cyber risk assessment tool from LoginTC. It was designed to help IT Administrators determine the level of MFA protection across their organization. We designed the MFA Gap Calculator to be the most user-friendly MFA questionnaire in the industry. With simply-worded questions, built-in examples, and logical calculations that ensure […]

    Learn more →

  • Cyphercor Achieves ISO 27001 Certification!

    April 05, 2023Thomas Sydorowski

    Cyphercor, the company behind LoginTC, is excited to announce that we have received ISO 27001 certification! This achievement represents the culmination of months of work and is a testament to our commitment to information security. As an authentication solution provider, we’re dedicated to providing our customers with the highest level of protection for their sensitive […]

    Learn more →

  • MFA Assessments Unpacked Part 4: Finishing your MFA Assessment

    April 04, 2023Victoria Savage

    MFA Assessments Part 4 In our last installment of our series MFA Assessments Unpacked, we dug into the meat of how to conduct an MFA assessment. Now that you’ve determined the scope of your MFA implementation and strength of your authentication types, it’s time to take action. These final two steps will show you how […]

    Learn more →

  • MFA Assessments Unpacked Part 3: Conducting Your MFA Assessment

    March 28, 2023Victoria Savage

    In the previous part of our series, MFA Assessments Unpacked, we discussed how to prepare for your MFA assessment. This is to ensure none of your digital assets are missed and you’re aware of everyone who has access to them. This time, we’ll start conducting our assessment with the aim of identifying two key features […]

    Learn more →

  • MFA Assessments Unpacked Part 2: Preparing Your MFA Assessment

    March 21, 2023Victoria Savage

    MFA Assessments Part 2 In Part 1 of our series MFA Assessments Unpacked, we discussed what an MFA assessment is, and why you should do one. Today we’re going to break down the first two critical steps in conducting an assessment of your organization’s MFA implementation. These steps are part of the preparatory stage of […]

    Learn more →

  • MFA Assessments Unpacked Part 1: What is an MFA Assessment?

    March 14, 2023Victoria Savage

    In our introduction to this series on MFA Assessments, we talked about how there’s been increased scrutiny of cybersecurity policies in recent years. Answering dozens of MFA-related questions on cyber insurance applications, vendor assessments, security audits, and more, is now a regular part of many IT professionals’ jobs. Being able to answer these questions accurately […]

    Learn more →

  • MFA Assessments Unpacked: An Introduction

    March 08, 2023Victoria Savage

    Does your organization use multi-factor authentication? It seems like a straightforward question. You’ve likely had to answer a few dozen questions like it in the past few years. Between cyber insurance questionnaires, vendor applications, auditing checklists, and more, the demand and scrutiny on IT departments has grown. But what does the question really mean, and […]

    Learn more →

  • More versatile authentication and administration with LoginTC’s latest product update

    February 28, 2023Thomas Sydorowski

    In our last major product update, we introduced new features to improve authentication security and administrator insights into your LoginTC accounts. Today we’re announcing our latest update to LoginTC that will enhance flexibility and add more versatile authentication solutions. This update introduces a brand new authentication method, and more options for end-user enrollment. Let’s dive […]

    Learn more →

  • What you need to know about the IRS’s MFA requirements

    February 01, 2023Victoria Savage

    If you’ve managed federal tax information in the past few months, you may have noticed the introduction of multi-factor authentication to the process. As part of the IRS’s initiative to ensure tax professionals are protecting their client data, the IRS began mandating the use of MFA on critical infrastructure. In this article, we’ll dig into […]

    Learn more →

  • Introducing LoginTC product updates to improve authentication security and administrator processes

    December 20, 2022Thomas Sydorowski

    It’s been another fantastic year here at LoginTC! From the launch of our on-premises MFA solution, LoginTC Managed, to the release of our unique cyber insurance-specific offering, our product and development teams have been hard at work ensuring LoginTC is ready for modern cybersecurity demands. That’s why we’re excited to close out the year with […]

    Learn more →

  • The MFA Requirements You Need to Know About

    December 12, 2022Alex Stevens

    Multi-factor Authentication (MFA) is becoming more common by the day. The United States government recently announced that it would require MFA sign-in methods for all federal agency staff. Companies are now requiring that users sign in via MFA rather than just using a username and password, and many cyber insurance policies also require that you use MFA.  […]

    Learn more →

  • LoginTC Product Update: Push Number Matching

    September 23, 2022Mercedes Chircop

    Here at Cyphercor, our focus is developing the best cybersecurity protection for your company. We believe that all organizations should have access to seamless, user friendly, secure, and well supported multi-factor authentication. We stay on top of cybersecurity trends and make improvements that keep our customers ahead of the cyber criminals. With that said, we […]

    Learn more →

  • Why is LoginTC the simplest MFA solution on the market?

    June 22, 2022Mercedes Chircop

    With many MFA options on the market, it’s hard to know how to evaluate them all and decide which solution works best for you. One of the reasons our customers come to us is how easy and user-friendly LoginTC is to operate. You’ve heard us say that LoginTC can be set up in just one […]

    Learn more →

  • Why the healthcare industry needs to think about cyber health too

    May 26, 2022Mercedes Chircop

    The healthcare industry is at the top of the list in terms of high-risk industries for cyber attacks. There are a few reasons as to why this would be, and yes it’s exactly what you’re thinking of.  Healthcare data holds information that is valuable to cyber criminals and with the industry moving towards more online […]

    Learn more →

  • Why is MFA required for cybersecurity insurance?

    May 16, 2022Mercedes Chircop

    As cybersecurity threats continue to rise, implementing MFA is now a mandatory requirement to qualify for most cyber insurance policies available on the market.  Learn about this requirement and how you can meet it at your organization. A history of cybersecurity insurance Cybersecurity insurance has been around since 1990 but has recently become popular, and […]

    Learn more →

  • Insights from the Cyber Insurance Innovation Conference 2022

    April 27, 2022Victoria Savage

    Last week I had the pleasure of attending Intelligent Insurer’s virtual “Cyber Insurance Innovation 2022” conference, a two-day conference that brought together stakeholders from all different parts of the cyber insurance industry. Representatives from insurance companies, insurance brokers, Insurtechs, and cyber insurance marketplaces came together to discuss the recent challenges in the market over the […]

    Learn more →

  • Does your MFA provider support offline Windows Logon and RDP authentication?

    April 18, 2022Mercedes Chircop

    Are you a Windows user and need remote access to your laptop or desktop? With remote work continuing to permeate our workplaces, logging in remotely to a Windows system persists as a common and often insecure activity that users across the globe perform every day. Many administrators correctly want to add a layer of security […]

    Learn more →

  • The World’s First Non-OTP Two Factor Authentication Chrome App: The LoginTC Chrome Extension

    April 01, 2022Mercedes Chircop

    Did you know that LoginTC has a chrome extension?! This feature came out in 2015 and was the world’s first non-OTP two factor authentication chrome app! This feature is a breakthrough in the cybersecurity industry and was truly ahead of its time when it was released and yes, you guessed it, it works on Chrome […]

    Learn more →

  • How To Protect Your Legacy System

    March 22, 2022Mercedes Chircop

    Do you have an existing legacy system still connected to your active network? Perhaps an old financial system or database, something containing integral and sensitive information that either can’t be or is too difficult to port to a newer system. If you do, you’re not alone. It’s estimated that around 30% of an organization’s technology […]

    Learn more →

  • Heightened Security Threats Call For Heightened Security Measures

    March 11, 2022Mercedes Chircop

    Governments around the world are waking up to the threat of cyber crime. According to an executive order from the White House in May of last year, small improvements to their protection won’t cut it and instead need to make a bold change and make significant investments in order to protect the government and its […]

    Learn more →

  • Supply Chain Data Breaches: Toyota Dealership

    March 04, 2022Mercedes Chircop

    Imagine you’re the owner of a manufacturing company. You produce thousands of products a day and store valuable information on your servers. Then all of a sudden you get notified of a data breach from one of your suppliers and your information has been affected yet again. Scrambling to figure out the source, you’re losing […]

    Learn more →

  • LoginTC Product update: UAC (Run as administrator) support is here!

    March 02, 2022Victoria Savage

    Cyphercor is excited to announce the completion of our long-awaited update to our flagship product, LoginTC, to introduce support for protecting UAC (Run as administrator) functions on your computer. This is an addition to our Windows Logon and RDP Connector, which is available for all of our Business tier users. What is it? For over […]

    Learn more →

  • The Future of Cybersecurity Insurance and MFA

    February 28, 2022Mercedes Chircop

    On February 23rd, Cyphercor hosted a live webinar all about the future of cybersecurity insurance and MFA. Cyphercor’s CEO Diego Matute was joined by insurance broker Blair Hancock as panelists for the discussion. On the agenda we discussed three primary topics: How did we get to where the nature of cybersecurity insurance is today? What […]

    Learn more →

  • How to make your employees part of the cybersecurity equation

    February 11, 2022Mercedes Chircop

    Cybersecurity can be confusing for employees to understand. Often employees think of something that management has to worry about, and don’t realize they play an integral role in ensuring the security of the company they work for. They might think, where do I even start? Or how does cybersecurity affect me? What can I do […]

    Learn more →

  • Why you need full MFA deployment to protect your company

    February 04, 2022Mercedes Chircop

    The COVID-19 pandemic and the rise in employees working from home has prompted companies to think of more secure ways to keep their private information safe. Despite this shift in thinking, the majority of companies are only protecting certain departments with MFA rather than every user. “Not putting MFA on all of your applications is kind of […]

    Learn more →

  • Why you shouldn’t ignore the social media factor when protecting your business from hackers

    January 27, 2022Mercedes Chircop

    Imagine this, you’re taking a break from work and scrolling through Facebook when you receive a message from a friend about a video that went viral and you’re in it. Curiosity kicks in and you think “what video?” and so you click the link, and at first everything is fine. You see it was a […]

    Learn more →

  • How many five-letter cybersecurity words can you name?

    January 19, 2022Victoria Savage

    The Wordle craze has taken the internet by storm, and knowing your cybersecurity lingo could help you figure out the daily word puzzle more than you realize.

    Learn more →

  • How the ransomware epidemic is affecting your company, even when you don’t get hit.

    January 13, 2022Victoria Savage

    While the world limps through yet another brutal wave of the COVID-19 pandemic, a quieter epidemic continues to rise: the ransomware epidemic.

    Learn more →

  • Cybersecurity Trends in 2022

    January 06, 2022Mercedes Chircop

    This year at Cyphercor, we’re taking a close look at cybersecurity trends for 2022 and what we can expect in the industry.

    Learn more →

  • LoginTC Log4j Impact

    December 14, 2021Thomas Sydorowski

    In light of the public disclosure of the Log4j vulnerability (CVE-2021-44228), our security team has performed a thorough review of the use of logging libraries in LoginTC products.

    Learn more →

  • Cybersecurity Insurance and MFA Attestations: Everything You Need To Know

    December 13, 2021Victoria Savage

    Has something like this happened to you recently? Your cybersecurity insurance is up for renewal, or perhaps you’re looking into purchasing some for the first time following a ransomware attack, and your insurer comes back to you with a surprising answer: fill out this MFA attestation form, or your premiums are going up. Depending on […]

    Learn more →

  • What’s on your cybersecurity wish-list?

    December 06, 2021Mercedes Chircop

    This year at Cyphercor, we’re taking a close look at cybersecurity trends for 2022 and what we can expect in the industry.

    Learn more →

  • Is an on-premises 2FA solution right for you

    November 18, 2021Mercedes Chircop

    We’re taking a look at what on-premise technology is, how it differs from cloud technology, and how it could be beneficial to your business.

    Learn more →

  • Introducing Our New On-Premises Solution: LoginTC Managed

    November 04, 2021Mercedes Chircop

    LoginTC Managed is a fully on-premises two-factor authentication solution that adds a layer of MFA to any RADIUS speaking service. Read more about how our on-premise solution can help your business stay secure.

    Learn more →

  • Cybersecurity Awareness Month: How You Can Phight the Phish

    October 14, 2021Mercedes Chircop

    Cybersecurity awareness month is here! Learn more about how to protect yourself from phishing scams using 2fa systems.

    Learn more →

  • How You Can Be Cybersafe

    October 06, 2021Mercedes Chircop

    October marks Cybersecurity Awareness Month and this week’s theme is being cyber safe! Read more about how you can stay cyber safe both at work and at home!

    Learn more →

  • “6 Barriers To Implementing 2FA and How To Overcome Them” Webinar Recap

    October 01, 2021Mercedes Chircop

    Missed our webinar? Don’t worry we got you covered. We outlined everything you need to know about implementing 2fa. Learn more today!

    Learn more →

  • Data Breaches in the Manufacturing Industry

    September 15, 2021Mercedes Chircop

    Data breaches and two factor authentication, how an extra layer of security can save your company millions and not slow down production. Learn more!

    Learn more →

  • Two Factor Authentication: Data Hacks and Breaches

    September 08, 2021Mercedes Chircop

    Two Factor Authentication, how it can protect your company’s information from hackers and data breaches. Learn more! Learn more

    Learn more →

  • 5 Back-to-work Cybersecurity Tips

    July 13, 2021Joel Balsam

    If you listen closely, you’ll hear the sound of millions of workers returning to the office after a long hiatus working from home.

    Learn more →

  • Why Radio Stations Need Cybersecurity, And What They Can Do To Protect Themselves

    May 14, 2021Joel Balsam

    You might already be thinking, “radio stations, really?’ Surely banks or multi-national corporations like Amazon or even accounting firms would be more of a target for cyber attacks than a station playing tunes and sharing the latest news.

    Learn more →

  • Hackers Are Pinpointing Accounting Firms, Leading To Identity Theft. Here’s How To Get Protected

    April 05, 2021Joel Balsam

    How would you feel if the person you trust most gave all your personal and financial information to someone else behind your back? Pretty angry, right?

    Learn more →

  • Architecture And Construction Firms Are Extremely Vulnerable To Cyber Attacks. Here’s How They’re Responding

    March 11, 2021Joel Balsam

    Think cybersecurity is only for companies like Amazon, Equifax, and Sony? Think again.

    Learn more →

  • Amazon and Walmart’s Not-So-Secret Weapon Against Cyber Attacks

    March 05, 2021Joel Balsam

    What do Amazon and Walmart have in common? Besides being industry-leading Fortune 500 multinationals, they both understand the importance of 2-Factor Authentication (2FA)

    Learn more →

  • Why MFA & Professional Liability Insurance (Cyber Insurance) Go Hand-In-Hand

    January 12, 2021Ilana Belfer

    Multi-factor authentication (MFA) could reduce the cost of your insurance

    Learn more →

  • The Hard Truth About Cyber Security

    September 12, 2018Patrick Duffin and Jolene Dilny

    Everyday prominent companies are making news headlines about security breaches, LoginTC has the answer to maturing your security stature

    Learn more →

  • Chinese Company Installs Backdoor on Android Devices

    August 29, 2018Patrick Duffin and Jolene Dilny

    BYOD and Two-Factor authentication

    Learn more →

  • How Formula 1 Utilizes Remote Access & the Importance of Network Security

    August 14, 2018Patrick Duffin and Jolene Dilny

    Two-Factor authentication can help boost your cyber security strategy

    Learn more →

  • Cost Implications To Lack of Cyber Security

    February 17, 2017Patrick Duffin

    Real dollar losses when two-Factor authentication is not considered

    Learn more →

  • Google’s Warning of Hacking Group Involvement

    January 05, 2017Patrick Duffin

    Two-Factor authentication can help protect your account

    Learn more →

  • Cyphercor Awarded with Federal Government Contract

    December 10, 2016Patrick Duffin

    LoginTC is pleased to announce it has been awarded a contract with the Canadian Federal Government

    Learn more →

  • LoginTC Becomes an Official Partner of WatchGuard

    December 09, 2016Patrick Duffin

    LoginTC is pleased to announce our official partnership with WatchGuard. WatchGuard is one of the leading competitors of advanced network security, including firewall and threat management solutions

    Learn more →

  • NIST No Longer Accepts SMS as a Two-Factor Authentication Method

    November 30, 2016Patrick Duffin

    LoginTC is pleased to announce our official partnership with WatchGuard. WatchGuard is one of the leading competitors of advanced network security, including firewall and threat management solutions

    Learn more →

  • Why WatchGuard administrators use LoginTC two factor authentication to protect their networks?

    June 29, 2015Hernan Matute

    WatchGuard administrators leverage documentation and performance of LoginTC two-factor authentication to protect their networks.

    Learn more →

  • Top 3 reasons to avoid SMS when choosing a 2-factor authentication provider

    May 15, 2015Ilana Belfer

    The majority of smartphone-based two-factor authentication (2FA) providers today use SMS to deliver second factor codes or one-time passwords to users. Here’s why they shouldn’t.

    Learn more →

  • Cyphercor named Top 20 Most Promising CA Technology Providers

    April 29, 2015Ilana Belfer

    CIOReview has awarded Cyphercor with the distinction of Top 20 Most Promising CA Technology Providers of 2015 for its flagship product LoginTC.

    Learn more →

  • Why you won’t believe the response to our native app for BlackBerry 10

    April 15, 2015Ilana Belfer

    LoginTC’s recent release of a native app for BB10 resulted in a remarkable response from the BlackBerry community and beyond.

    Learn more →

  • Introducing LoginTC Chrome: World’s first non-OTP 2-factor authentication Chrome app

    April 08, 2015Ilana Belfer

    In a cybersecurity breakthrough, Cyphercor Inc. releases the first ever non-OTP (one-time password) based two-factor authentication app for desktops and laptops via Google Chrome.

    Learn more →

  • SC Magazine awards LoginTC near perfect score

    April 02, 2015Ilana Belfer

    SC Magazine has awarded LoginTC with a glowing product review and rating of 4.5/5 stars.

    Learn more →

  • SMiShing: The new & dangerous way hackers are infiltrating your smartphone, and what 2FA can do about it

    March 24, 2015Ilana Belfer

    Phishing attacks remain pravelent and continue to increase in sophistication. In this blog, we focus on SMiShing, SMS-based phishing attacks. Learn how to protect yourself with two-factor authentication.

    Learn more →

  • Top 5 reasons hard tokens are hard to manage

    March 16, 2015Ilana Belfer

    Hard Tokens are the most common method of 2FA deployment. But that doesn’t make them the best method. Here are 5 reasons why hard tokens are hard to manage!

    Learn more →

  • How to set up your VPN with LoginTC 2FA

    March 05, 2015Ilana Belfer

    Enabling two-factor authentication for your VPN is simple with LoginTC. Here’s how to set it up.

    Learn more →

  • How VPN admins & security managers use LoginTC to protect their networks

    February 25, 2015Ilana Belfer

    Some insight into how VPN administrators and security managers are currently using LoginTC two-factor authentication to protect their networks.

    Learn more →

  • The need for contextual information within multifactor authentication

    February 19, 2015Ilana Belfer

    LoginTC seamlessly incorporates contextual information into its 2FA system for real-time threat detection / fraud alert.

    Learn more →

Start your free trial today. No credit card required.

Sign up and Go