Blog

MGM Data Breach Blog Thumbnail

MGM Data Breach: How Hackers Used Vishing to Target IT Help Desk

Home » Blog Share on Facebook Facebook Share on Linkedin Linkedin 𝕏 Share on Twitter Twitter LinkedIn as the Trojan Horse at MGM: The Rising Threat of Social Engineering in IT Security Imagine, just for a moment, that the walls guarding your fortress – that formidable digital infrastructure your IT team-built brick by brick – …

MGM Data Breach: How Hackers Used Vishing to Target IT Help Desk Read More »

OKTA urgent hackers target help desks

Okta Urgent: Hackers target IT Help Desks to Gain Super Admin

Home » Blog Share on Facebook Facebook Share on Linkedin Linkedin 𝕏 Share on Twitter Twitter Okta Urgent: Hackers Target IT Help Desks to Gain Super Admin ALERT Recent reports from Okta highlight a surge in cybercriminals targeting IT help desks via phones to access credentials and critical assets. It’s no longer a theoretical risk, …

Okta Urgent: Hackers target IT Help Desks to Gain Super Admin Read More »

Social Engineering from Fairytales

Will you be eaten by a wolf? – Even Little Red Riding Hood needs identity verification!

Home » Blog Share on Facebook Facebook Share on Linkedin Linkedin 𝕏 Share on Twitter Twitter Will you be eaten by a wolf? – Even Little Red Riding Hood needs identity verification! Don’t we all remember Little Red Riding Hood as part of our warm childhood memories? It is surprising that she even had to …

Will you be eaten by a wolf? – Even Little Red Riding Hood needs identity verification! Read More »

Stop being the Victim: Win the Battle against Social Engineering Attacks! Main Thumbnail

Stop being the Victim: Win the Battle against Social Engineering Attacks! [WEBINAR]

Home » Blog Share on Facebook Facebook Share on Linkedin Linkedin 𝕏 Share on Twitter Twitter Stop being the Victim: Win the Battle against Social Engineering Attacks! [WEBINAR] Finn Jensen, FastPass CEO, has been invited by LogOn International to share his insights on various social engineering attacks in the industry today: How to identify and …

Stop being the Victim: Win the Battle against Social Engineering Attacks! [WEBINAR] Read More »

Identity Theft from the IT-department is the Achilles Heel for Identity Management Solutions

Identity Theft from the IT-department is the Achilles Heel for Identity Management Solutions

Home » Blog Share on Facebook Facebook Share on Linkedin Linkedin 𝕏 Share on Twitter Twitter Identity Theft from the IT-department is the Achilles Heel for Identity Management Solutions This blog discusses the risk for identity theft of enterprise users’ accounts through the IT-department. It also presents a solution to protect internal processes and services …

Identity Theft from the IT-department is the Achilles Heel for Identity Management Solutions Read More »

Podcast Social Engineerign attacks main

Preventing Social Engineering Attacks: Strategies in Asia [LOGON Cybersecurity Podcast]

Home » Blog Share on Facebook Facebook Share on Linkedin Linkedin 𝕏 Share on Twitter Twitter Preventing Social Engineering Attacks: Strategies in Asia LOGON TO CYBERSECURITY PODCAST In this episode of LogOn to Cybersecurity Podcast, FastPass Founder, Finn Jensen, shared his insights and experience in dealing with social engineering attacks plus shared the most effective …

Preventing Social Engineering Attacks: Strategies in Asia [LOGON Cybersecurity Podcast] Read More »

How AI Voice Mimicking is a Security Risk

Home » Blog Share on Facebook Facebook Share on Linkedin Linkedin 𝕏 Share on Twitter Twitter How AI voice mimicking is a security risk Quickly evolving in sophistication, some AI voice-generating software requires just a few sentences of audio to convincingly produce speech that conveys the sound and emotional tone of a speaker’s voice, while other options need as …

How AI Voice Mimicking is a Security Risk Read More »

Reddit systems hacked by a sophisticated and highly-targeted phishing attack

Home » Blog Share on Facebook Facebook Share on Linkedin Linkedin 𝕏 Share on Twitter Twitter Reddit Systems Hacked by a Sophisticated and Highly-targeted Phishing Attack Hackers have gained access to internal Reddit systems. They targeted Reddit employees with a sophisticated phishing campaign. They obtained an employee’s credentials, and then had access to internal systems …

Reddit systems hacked by a sophisticated and highly-targeted phishing attack Read More »

MitID and FastPass

MitID øger intern sikkerhed

Home » Blog Share on Facebook Facebook Share on Linkedin Linkedin 𝕏 Share on Twitter Twitter MitID øger intern sikkerhed MitId er rullet ud til alle danskere nu. Vi ser på MitId som en autentifikationsmetode til at skabe sikker forbindelser mellem borgere og det offentlige/banker. MitID bør imidlertid også anvendes til at skabe en sikker …

MitID øger intern sikkerhed Read More »

MailChimp Data Breach img

Mailchimp breached twice by spear phishing against IT-department

Home » Blog Share on Facebook Facebook Share on Linkedin Linkedin 𝕏 Share on Twitter Twitter Mailchimp breached twice by spear phishing against IT-department Email marketing giant Mailchimp announced it was hacked in January 2023 by a social engineering attack. The fact that the same attack type was successful in March 2022 shows the potential …

Mailchimp breached twice by spear phishing against IT-department Read More »

Best SSPR Products Blog

What are the 10 best SSPR solutions?

Home » Blog Share on Facebook Facebook Share on Linkedin Linkedin 𝕏 Share on Twitter Twitter What are the 10 best SSPR solutions? With hundreds of large customers we have gained a lot of experience with customers’ interests and questions when they are about to decide for a new SSPR solution (Self-Service Password Reset). Often, …

What are the 10 best SSPR solutions? Read More »

CISCO data breach

CISCO’s Corporate Network breached with Vishing method

Home » Blog Share on Facebook Facebook Share on Linkedin Linkedin 𝕏 Share on Twitter Twitter CISCO’s Corporate Network breached with Vishing method Network equipment manufacturer giant Cisco, confirmed on 11 August 2022, that their corporate network was breached by the Yanluowang ransomware group and they were able to obtain access to Cisco’s employees’ accounts. …

CISCO’s Corporate Network breached with Vishing method Read More »

Protect the passwords main featured image

Ways to protect the password before the user receives their first password

Home » Blog Share on Facebook Facebook Share on Linkedin Linkedin 𝕏 Share on Twitter Twitter Ways to protect the password before the user receives their first password Nobody wants a user’s password to be in the hands of other people than the user herself. We do however have situations where the user needs help …

Ways to protect the password before the user receives their first password Read More »

Press Release Header

FastPassCorp joins ServiceNow Partner Program

Home » Blog Share on Facebook Facebook Share on Linkedin Linkedin Share on Twitter Twitter FastPassCorp joins ServiceNow Partner Program FastPass integrates with ServiceNow to protect the service desks against social engineering COPENHAGEN, Denmark — February 16,2022 — FastPassCorp today announced it has joined the ServiceNow Partner Program and is releasing a new integration with …

FastPassCorp joins ServiceNow Partner Program Read More »

FastPass UK featured image

FastPassCorp and partner KSS of UK join forces to increase customer value

Home » Blog Share on Facebook Facebook Share on Linkedin Linkedin Share on Twitter Twitter June 4, 2021 FastPassCorp and partner KSS of UK join forces to increase customer value The leader in Self-Service Password Reset (SSPR) and Identity Verification solutions FastPassCorp takes over the British distributor Knowledge Secure Systems Ltd (KSS) in an equity-based …

FastPassCorp and partner KSS of UK join forces to increase customer value Read More »

FastPass Performance Review

Revisit your IT business case

All IT projects should have a business case, specifying the benefits we expect. For Self-Service Password Reset SSPR projects or password synchronization projects, it is my experience that the majority of corporations have a clear idea of what the objectives are. Reduce the number of password calls to the service desk by a certain number …

Revisit your IT business case Read More »

Manager Approval Header

Manager Approval in Password Self-Service

Home » Blog Share on Facebook Facebook Share on Linkedin Linkedin Share on Twitter Twitter Manager Approval in Self-Service Is password self-service secure? The most frequently used verification tests in SSPR solutions are questions/answers and SMS codes. Security experts question the security of both tests. Q/A might be researched and guessed by hackers through social …

Manager Approval in Password Self-Service Read More »

IVM Blog header

FastPass Identity Verification Manager

In April 2020, FastPassCorp announced Identity Verification Client -IVC- as a new module for FastPass Enterprise. The FastPass Enterprise has for many years been highly regarded as the leading Self-Service Password Reset (SSPR) solution in the market, covering all corporate passwords and available for on-premise and cloud. After 6 months we however see very high …

FastPass Identity Verification Manager Read More »

BBC News: ”Twitter hack: Staff tricked by phone spear phishing scam”

BBC has an in-depth analysis of the Twitter hack, and how the hackers used phones to exploit the service desk at Twitter In the article, Spear-phishing was defined as a targeted attack designed to trick a number of people into handing out information such as passwords for twitter account and other confidential information. Not all the employees …

BBC News: ”Twitter hack: Staff tricked by phone spear phishing scam” Read More »

Identity Verification in Identity Management

Who owns Identity Verification in Identity Management? Almero Stein, Chief Technology Officer of Integralis sits down with FastPassCorp’s CEO Finn Jensen to talk about accountability of Identity Verification in an organization.  Q1:  Where do the real warm people belong in Identity?  Almero: Typically, we refer subconsciously to identities as warm body people, but it so much more.  Q2: How do we control …

Identity Verification in Identity Management Read More »

Verizon Investigations Report: Human Element is the most important

Home » Blog Share on Facebook Facebook Share on Linkedin Linkedin Share on Twitter Twitter Verizon DBIR 2020: “..the human element is the most important element to a CISO”. Gabriel Bassett, Information Security Data Scientist from the Verizon Data Breach Investigations Report team says: “I think the human element is the most important element to a …

Verizon Investigations Report: Human Element is the most important Read More »

High5 Series: Ethical Hacker from Denver explains how companies are attacked through Service Desks’ emotions

Home » Blog Share on Facebook Facebook Share on Linkedin Linkedin Share on Twitter Twitter High5 Series: Ethical Hacker from Denver explains how companies are attacked through Service Desks’ emotions Brian Self a Certified Information Systems Security Professional (CISSP) & ethical hacker has been interviewed by FastPassCorp’s CEO Finn Jensen about Social Engineering in Service …

High5 Series: Ethical Hacker from Denver explains how companies are attacked through Service Desks’ emotions Read More »

You might be in trouble if your user verification is SMS-dependent

Home » Blog Share on Facebook Facebook Share on Linkedin Linkedin Share on Twitter Twitter You might be in trouble if your user verification is SMS-dependent Now that most employees are working from home, calls to the Service Desk will come externally. For some security policy, SMS authentication is required to verify their identity. But …

You might be in trouble if your user verification is SMS-dependent Read More »

Reduce the risk of data breach in 2020 with Password Self Service

At FastPassCorp, we believe that we now sow the seeds for 2020’s success. Step into 2020 with a clear understanding and plan for how your company can benefit from Self Service Password Reset with our full guide “6 Steps to success with Password Self-Service”. As password calls to service desks in the average count for 20-30% of all calls, …

Reduce the risk of data breach in 2020 with Password Self Service Read More »

5 reasons why users reject self-service password solutions

Home » Blog Share on Facebook Facebook Share on Linkedin Linkedin Share on Twitter Twitter 5 reasons why users reject self-service password solutions The first step in improvement is the understanding of your challenges! You might have experienced low adoption of your self-service of password reset (SSPR) solution like many others?According to the Service Desk …

5 reasons why users reject self-service password solutions Read More »

Speed up your corporate security with Self-Assessment Tool

With more than 10 years of experience working with large organizations and partners, we have gained deep experience in password-related risks and know how to reduce them. The free self-assessment report by FastPassCorp will give you a 360-degree view of the corporate present status of password policy and processes and point to areas of improvement. …

Speed up your corporate security with Self-Assessment Tool Read More »

Is the Humble Password Really Dead?[FREE GUIDE]

The article “Password Obituary: But is the Humble Password Really Dead?” be Finn Jensen, CEO of FastPassCorp was recently released. Now Spanish and German versions are available. Download below and enjoy! Passwort Nachruf: Aber ist das Passwort wirklich tot? Download Obituario de contraseña: Pero, ¿está la humilde contraseña realmente muerta? Download The English version is …

Is the Humble Password Really Dead?[FREE GUIDE] Read More »

Is Windows’ strong password policy as strong as you need?

Home » Blog Share on Facebook Facebook Share on Linkedin Linkedin Share on Twitter Twitter Is Windows’ strong password policy as strong as you need? Enabling Windows’ strong password policy requires that users comply with 3 out of 5 character requirements. This will not protect your users’ accounts from attacks based on guessing or breaches …

Is Windows’ strong password policy as strong as you need? Read More »

Passwords vs. Biometrics and Multi-factor Authentication

The most common way to protect data and provide user authentication is passwords, but nowadays we face a slow decline in their popularity. To sustain acceptable security standards, both businesses and users look for alternatives to their password-based systems. Today biometrics are increasingly popular for authentication, like fingerprint and facial scans. The technology is based …

Passwords vs. Biometrics and Multi-factor Authentication Read More »

Has your service desk been attacked for passwords? Only 42% haven’t been attacked!

In a Service Desk Institute (SDI) research it is revealed, that the service desk will often be the entry point for a deceptive attack. As the SDI report says: “As to the reality of the risks of unauthorised access to end-user data, Figure 9 shows that 27% of respondents stated that their organisation had identified …

Has your service desk been attacked for passwords? Only 42% haven’t been attacked! Read More »

Data breach through deception

Several years ago one of the most well-known hackers Kevin Mitnick (see below) wrote a book on the art of deception, as the easiest way to get access to data and computer systems. Kevin Mitnick knows all there is to know about ways to breach into computer systems with hacker tools. Still he claims that …

Data breach through deception Read More »

83% of IT services desks fear they might give passwords to criminals!

Can a hacker get access to sensitive corporate data without the use of advanced  hacking technology? According to a new survey report from Service Desk Institute then it seems to be very easy indeed! As shown in this illustration 83% of respondents think that, despite the controls being in place, it’s still possible for a …

83% of IT services desks fear they might give passwords to criminals! Read More »

Scroll to Top