Blog

Password Sync for Azure Entra

Navigating the Complexities of Password Synchronization with Azure Entra

Home » Blog Share on Facebook Facebook Share on Linkedin Linkedin 𝕏 Share on Twitter Twitter Navigating the Complexities of Password Synchronization with Azure Entra ID Finn Jensen | Founder, FastPasscorp In the ever-evolving landscape of corporate IT, the quest for seamless user experience often leads us down the path of integration and synchronization. Azure Entra […]

Navigating the Complexities of Password Synchronization with Azure Entra Read More »

Help-Desk-Password-Theft-IBM-Survey-Blog

23% of Attacks Rely on Stolen Passwords – How Help Desk Password Theft is Compromising Our Cybersecurity

Home » Blog Share on Facebook Facebook Share on Linkedin Linkedin 𝕏 Share on Twitter Twitter 23% of Attacks Rely on Stolen Passwords – How Help Desk Password Theft is Compromising Our Cybersecurity Finn Jensen | Founder, FastPasscorp According to the latest findings from the IBM/Ponemon 2023 survey, social engineering and stolen or compromised credentials are

23% of Attacks Rely on Stolen Passwords – How Help Desk Password Theft is Compromising Our Cybersecurity Read More »

Financial-Impact-of-Data-Breaches-IBM-2023-Report

Understanding the Financial Impact of Data Breaches: Insights from IBM’s 2023 Report

Home » Blog Share on Facebook Facebook Share on Linkedin Linkedin 𝕏 Share on Twitter Twitter Understanding the Financial Impact of Data Breaches: Insights from IBM’s 2023 Report Finn Jensen | Founder, FastPasscorp In the rapidly evolving digital world, the financial consequences of data breaches are becoming increasingly significant for businesses across the globe. The IBM-sponsored

Understanding the Financial Impact of Data Breaches: Insights from IBM’s 2023 Report Read More »

Identity Proofing Data Breach Risk

Fortifying IT Help Desk Security with FastPass: Mastering Identity Verification

Home » Blog Share on Facebook Facebook Share on Linkedin Linkedin 𝕏 Share on Twitter Twitter Fortifying IT Help Desk Security with FastPass: Mastering Identity Verification Finn Jensen | Founder, FastPasscorp Turning the Tide: Proactive Solutions to Thwart Social Engineering at Your Help Desk Picture this alarming scenario: It’s a regular day at the office, and

Fortifying IT Help Desk Security with FastPass: Mastering Identity Verification Read More »

How Help Desk Identity Verification Fails in the Real World

How Help Desk Identity Verification Fails in the Real World

Home » Blog Share on Facebook Facebook Share on Linkedin Linkedin 𝕏 Share on Twitter Twitter How Help Desk Identity Verification Fails in the Real World Finn Jensen | Founder, FastPasscorp In the realm of IT management and security, ensuring the effectiveness of your help desk’s identity verification process is paramount. Are your IT help desk

How Help Desk Identity Verification Fails in the Real World Read More »

MGM style social engineering

Defending Your Help Desk Against “MGM-Style” Social Engineering

Home » Blog Share on Facebook Facebook Share on Linkedin Linkedin 𝕏 Share on Twitter Twitter Defending Your Help Desk Against “MGM-Style” Social Engineering In the wake of the MGM data breach, conversations around help desk vulnerabilities have intensified. I’ve engaged with numerous IT-security specialists, seeking insights on staving off identity theft at the help

Defending Your Help Desk Against “MGM-Style” Social Engineering Read More »

Social Engineering from Fairytales

Will you be eaten by a wolf? – Even Little Red Riding Hood needs identity verification!

Home » Blog Share on Facebook Facebook Share on Linkedin Linkedin 𝕏 Share on Twitter Twitter Will you be eaten by a wolf? – Even Little Red Riding Hood needs identity verification! Don’t we all remember Little Red Riding Hood as part of our warm childhood memories? It is surprising that she even had to

Will you be eaten by a wolf? – Even Little Red Riding Hood needs identity verification! Read More »

Stop being the Victim: Win the Battle against Social Engineering Attacks! Main Thumbnail

Stop being the Victim: Win the Battle against Social Engineering Attacks! [WEBINAR]

Home » Blog Share on Facebook Facebook Share on Linkedin Linkedin 𝕏 Share on Twitter Twitter Stop being the Victim: Win the Battle against Social Engineering Attacks! [WEBINAR] Finn Jensen, FastPass CEO, has been invited by LogOn International to share his insights on various social engineering attacks in the industry today: How to identify and

Stop being the Victim: Win the Battle against Social Engineering Attacks! [WEBINAR] Read More »

Identity Theft from the IT-department is the Achilles Heel for Identity Management Solutions

Identity Theft from the IT-department is the Achilles Heel for Identity Management Solutions

Home » Blog Share on Facebook Facebook Share on Linkedin Linkedin 𝕏 Share on Twitter Twitter Identity Theft from the IT-department is the Achilles Heel for Identity Management Solutions This blog discusses the risk for identity theft of enterprise users’ accounts through the IT-department. It also presents a solution to protect internal processes and services

Identity Theft from the IT-department is the Achilles Heel for Identity Management Solutions Read More »

Podcast Social Engineerign attacks main

Preventing Social Engineering Attacks: Strategies in Asia [LOGON Cybersecurity Podcast]

Home » Blog Share on Facebook Facebook Share on Linkedin Linkedin 𝕏 Share on Twitter Twitter Preventing Social Engineering Attacks: Strategies in Asia LOGON TO CYBERSECURITY PODCAST In this episode of LogOn to Cybersecurity Podcast, FastPass Founder, Finn Jensen, shared his insights and experience in dealing with social engineering attacks plus shared the most effective

Preventing Social Engineering Attacks: Strategies in Asia [LOGON Cybersecurity Podcast] Read More »

How AI Voice Mimicking is a Security Risk

Home » Blog Share on Facebook Facebook Share on Linkedin Linkedin 𝕏 Share on Twitter Twitter How AI voice mimicking is a security risk Quickly evolving in sophistication, some AI voice-generating software requires just a few sentences of audio to convincingly produce speech that conveys the sound and emotional tone of a speaker’s voice, while other options need as

How AI Voice Mimicking is a Security Risk Read More »

Reddit systems hacked by a sophisticated and highly-targeted phishing attack

Home » Blog Share on Facebook Facebook Share on Linkedin Linkedin 𝕏 Share on Twitter Twitter Reddit Systems Hacked by a Sophisticated and Highly-targeted Phishing Attack Hackers have gained access to internal Reddit systems. They targeted Reddit employees with a sophisticated phishing campaign. They obtained an employee’s credentials, and then had access to internal systems

Reddit systems hacked by a sophisticated and highly-targeted phishing attack Read More »

MitID and FastPass

MitID øger intern sikkerhed

Home » Blog Share on Facebook Facebook Share on Linkedin Linkedin 𝕏 Share on Twitter Twitter MitID øger intern sikkerhed MitId er rullet ud til alle danskere nu. Vi ser på MitId som en autentifikationsmetode til at skabe sikker forbindelser mellem borgere og det offentlige/banker. MitID bør imidlertid også anvendes til at skabe en sikker

MitID øger intern sikkerhed Read More »

MailChimp Data Breach img

Mailchimp breached twice by spear phishing against IT-department

Home » Blog Share on Facebook Facebook Share on Linkedin Linkedin 𝕏 Share on Twitter Twitter Mailchimp breached twice by spear phishing against IT-department Email marketing giant Mailchimp announced it was hacked in January 2023 by a social engineering attack. The fact that the same attack type was successful in March 2022 shows the potential

Mailchimp breached twice by spear phishing against IT-department Read More »

Best SSPR Products Blog

What are the 10 best SSPR solutions?

Home » Blog Share on Facebook Facebook Share on Linkedin Linkedin 𝕏 Share on Twitter Twitter What are the 10 best SSPR solutions? With hundreds of large customers we have gained a lot of experience with customers’ interests and questions when they are about to decide for a new SSPR solution (Self-Service Password Reset). Often,

What are the 10 best SSPR solutions? Read More »

CISCO data breach

CISCO’s Corporate Network breached with Vishing method

Home » Blog Share on Facebook Facebook Share on Linkedin Linkedin 𝕏 Share on Twitter Twitter CISCO’s Corporate Network breached with Vishing method Network equipment manufacturer giant Cisco, confirmed on 11 August 2022, that their corporate network was breached by the Yanluowang ransomware group and they were able to obtain access to Cisco’s employees’ accounts.

CISCO’s Corporate Network breached with Vishing method Read More »

Press Release Header

FastPassCorp joins ServiceNow Partner Program

Home » Blog Share on Facebook Facebook Share on Linkedin Linkedin Share on Twitter Twitter FastPassCorp joins ServiceNow Partner Program FastPass integrates with ServiceNow to protect the service desks against social engineering COPENHAGEN, Denmark — February 16,2022 — FastPassCorp today announced it has joined the ServiceNow Partner Program and is releasing a new integration with

FastPassCorp joins ServiceNow Partner Program Read More »

FastPass UK featured image

FastPassCorp and partner KSS of UK join forces to increase customer value

Home » Blog Share on Facebook Facebook Share on Linkedin Linkedin Share on Twitter Twitter June 4, 2021 FastPassCorp and partner KSS of UK join forces to increase customer value The leader in Self-Service Password Reset (SSPR) and Identity Verification solutions FastPassCorp takes over the British distributor Knowledge Secure Systems Ltd (KSS) in an equity-based

FastPassCorp and partner KSS of UK join forces to increase customer value Read More »

FastPass Performance Review

Revisit your IT business case

All IT projects should have a business case, specifying the benefits we expect. For Self-Service Password Reset SSPR projects or password synchronization projects, it is my experience that the majority of corporations have a clear idea of what the objectives are. Reduce the number of password calls to the service desk by a certain number

Revisit your IT business case Read More »

Manager Approval Header

Manager Approval in Password Self-Service

Home » Blog Share on Facebook Facebook Share on Linkedin Linkedin Share on Twitter Twitter Manager Approval in Self-Service Is password self-service secure? The most frequently used verification tests in SSPR solutions are questions/answers and SMS codes. Security experts question the security of both tests. Q/A might be researched and guessed by hackers through social

Manager Approval in Password Self-Service Read More »

IVM Blog header

FastPass Identity Verification Manager

In April 2020, FastPassCorp announced Identity Verification Client -IVC- as a new module for FastPass Enterprise. The FastPass Enterprise has for many years been highly regarded as the leading Self-Service Password Reset (SSPR) solution in the market, covering all corporate passwords and available for on-premise and cloud. After 6 months we however see very high

FastPass Identity Verification Manager Read More »

BBC News: ”Twitter hack: Staff tricked by phone spear phishing scam”

BBC has an in-depth analysis of the Twitter hack, and how the hackers used phones to exploit the service desk at Twitter In the article, Spear-phishing was defined as a targeted attack designed to trick a number of people into handing out information such as passwords for twitter account and other confidential information. Not all the employees

BBC News: ”Twitter hack: Staff tricked by phone spear phishing scam” Read More »

Identity Verification in Identity Management

Who owns Identity Verification in Identity Management? Almero Stein, Chief Technology Officer of Integralis sits down with FastPassCorp’s CEO Finn Jensen to talk about accountability of Identity Verification in an organization.  Q1:  Where do the real warm people belong in Identity?  Almero: Typically, we refer subconsciously to identities as warm body people, but it so much more.  Q2: How do we control

Identity Verification in Identity Management Read More »

Verizon Investigations Report: Human Element is the most important

Home » Blog Share on Facebook Facebook Share on Linkedin Linkedin Share on Twitter Twitter Verizon DBIR 2020: “..the human element is the most important element to a CISO”. Gabriel Bassett, Information Security Data Scientist from the Verizon Data Breach Investigations Report team says: “I think the human element is the most important element to a

Verizon Investigations Report: Human Element is the most important Read More »

High5 Series: Ethical Hacker from Denver explains how companies are attacked through Service Desks’ emotions

Home » Blog Share on Facebook Facebook Share on Linkedin Linkedin Share on Twitter Twitter High5 Series: Ethical Hacker from Denver explains how companies are attacked through Service Desks’ emotions Brian Self a Certified Information Systems Security Professional (CISSP) & ethical hacker has been interviewed by FastPassCorp’s CEO Finn Jensen about Social Engineering in Service

High5 Series: Ethical Hacker from Denver explains how companies are attacked through Service Desks’ emotions Read More »

You might be in trouble if your user verification is SMS-dependent

Home » Blog Share on Facebook Facebook Share on Linkedin Linkedin Share on Twitter Twitter You might be in trouble if your user verification is SMS-dependent Now that most employees are working from home, calls to the Service Desk will come externally. For some security policy, SMS authentication is required to verify their identity. But

You might be in trouble if your user verification is SMS-dependent Read More »

Reduce the risk of data breach in 2020 with Password Self Service

At FastPassCorp, we believe that we now sow the seeds for 2020’s success. Step into 2020 with a clear understanding and plan for how your company can benefit from Self Service Password Reset with our full guide “6 Steps to success with Password Self-Service”. As password calls to service desks in the average count for 20-30% of all calls,

Reduce the risk of data breach in 2020 with Password Self Service Read More »

5 reasons why users reject self-service password solutions

Home » Blog Share on Facebook Facebook Share on Linkedin Linkedin Share on Twitter Twitter 5 reasons why users reject self-service password solutions The first step in improvement is the understanding of your challenges! You might have experienced low adoption of your self-service of password reset (SSPR) solution like many others?According to the Service Desk

5 reasons why users reject self-service password solutions Read More »

Is the Humble Password Really Dead?[FREE GUIDE]

The article “Password Obituary: But is the Humble Password Really Dead?” be Finn Jensen, CEO of FastPassCorp was recently released. Now Spanish and German versions are available. Download below and enjoy! Passwort Nachruf: Aber ist das Passwort wirklich tot? Download Obituario de contraseña: Pero, ¿está la humilde contraseña realmente muerta? Download The English version is

Is the Humble Password Really Dead?[FREE GUIDE] Read More »

Passwords vs. Biometrics and Multi-factor Authentication

The most common way to protect data and provide user authentication is passwords, but nowadays we face a slow decline in their popularity. To sustain acceptable security standards, both businesses and users look for alternatives to their password-based systems. Today biometrics are increasingly popular for authentication, like fingerprint and facial scans. The technology is based

Passwords vs. Biometrics and Multi-factor Authentication Read More »

Has your service desk been attacked for passwords? Only 42% haven’t been attacked!

In a Service Desk Institute (SDI) research it is revealed, that the service desk will often be the entry point for a deceptive attack. As the SDI report says: “As to the reality of the risks of unauthorised access to end-user data, Figure 9 shows that 27% of respondents stated that their organisation had identified

Has your service desk been attacked for passwords? Only 42% haven’t been attacked! Read More »

Data breach through deception

Several years ago one of the most well-known hackers Kevin Mitnick (see below) wrote a book on the art of deception, as the easiest way to get access to data and computer systems. Kevin Mitnick knows all there is to know about ways to breach into computer systems with hacker tools. Still he claims that

Data breach through deception Read More »

Scroll to Top