Blog

Stay up to date on the latest news, solutions and trends as told and recommended by cybersecurity pros.

Tech Talk Tuesday – Principle of Least Privilege

Welcome to #TechTalkTuesday – where tech terms are defined, explained, and no longer a mystery.  Today we’re talking about the...

Read more

Healthcare organizations can boost cybersecurity with a zero-trust approach

The IT environment of a healthcare organization can be quite dynamic. The number of users accessing the systems can be vast. Doctors,...

Read more

Tech Talk Tuesday – Zero Trust

Welcome to #TechTalkTuesday – where tech terms are defined, explained, and no longer a mystery.  Today we’re exploring the term Zero...

Read more

IAM and CIAM – What you need to know

On TechTalkTuesday last week we covered identity and access management (IAM). This week we touched on customer identity and access...

Read more

TechTalkTuesday – CIAM

Welcome to #TechTalkTuesday – where tech terms are defined, explained, and no longer a mystery.  Today we’re exploring the term...

Read more

Your bank account has been compromised – what now?

It’s not something that any of us like to think about. But the reality is that bank account hacking and cyber-attacks related to online...

Read more

TechTalkTuesday – IAM

Welcome to #TechTalkTuesday – where tech terms are defined, explained, and no longer a mystery.  Today we’re exploring the term...

Read more

Authentication and Authorization – What you need to know

The past two Tuesdays saw us covering the terms authentication and authorization on our TechTalkTuesday posts. While the terms may sound...

Read more

TechTalkTuesday – Authorization

Welcome to #TechTalkTuesday – where tech terms are defined, explained, and no longer a mystery.  Last week we explored authentication....

Read more

The top factors that can fuel account takeover fraud

In social media circles, you may hear family or friends talk about their accounts as having been hacked. While not entirely inaccurate, a...

Read more

TechTalkTuesday – Authentication

Welcome to #TechTalkTuesday – where tech terms are defined, explained, and no longer a mystery. Today we’re delving into...

Read more

Start 2022 with a new cybersecurity plan

With 2022 now well underway, there’s no better time to evaluate your company’s current cybersecurity plan or to create a fresh...

Read more

TechTalkTuesday: Single Sign-On

Welcome to #TechTalkTuesday – where tech terms are defined, explained, and no longer a mystery.  Today we’re discussing single...

Read more

Do you know what credential stuffing is?

Have you heard of credential stuffing? This form of cyberattack is one of the most common data breach causes. Through credential stuffing...

Read more

Those emails about great deals and steals may be too good to be true

With the holiday season in full swing, many of us see our inboxes inundated with emails from companies offering a plethora of deals,...

Read more

TechTalkTuesday – Card-not-present fraud

Welcome to #TechTalkTuesday – where tech terms are defined, explained, and no longer a mystery. Today we’re discussing...

Read more

TechTalkTuesday – Backend and frontend

Welcome to #TechTalkTuesday – where tech terms are defined, explained, and no longer a mystery. Today we’re covering two terms:...

Read more

What is SIM swapping? What do you need to know?

Did you know that the very same smartphone in your hand could potentially offer a cybercriminal a way to access your financial accounts?...

Read more

TechTalkTuesday – User Interface

Welcome to #TechTalkTuesday – where tech terms are defined, explained, and no longer a mystery. Today’s term is user interface. Often...

Read more

How to choose a highly secure password

It feels like we need to create and use a password for just about everything. Whether unlocking our devices, accessing social media,...

Read more

TechTalkTuesday – Digital Footprint

Welcome to #TechTalkTuesday – where tech terms are defined, explained, and no longer a mystery. Today’s term is digital footprint. Your...

Read more

Building Security & Trust in Mobile Banking as Adoption Increases Webinar

On November 4, ZenKey CEO Alex Schlager presented a webinar to the Consumer Bankers Association. During the informative webinar, Alex...

Read more

What is ransomware? How can you prevent it or stop it?

Are you worried about ransomware? Or is it something you simply don’t give much thought to? Ransomware may not have yet become a...

Read more

TechTalkTuesday – Spoofing

Welcome to #TechTalkTuesday – where tech terms are defined, explained, and no longer a mystery. Today’s term is spoofing. Have you...

Read more

Do you know what social engineering looks like?

You may have heard the term thrown around. You may have read an article online or watched a brief report on the news about it. But how much...

Read more

Account Takeover Fraud – What do you need to know?

Have you found yourself the victim of account takeover fraud? If you have not, you’re in luck. Unfortunately, account takeover fraud is...

Read more

TechTalkTuesday – IoT

It’s #TechTalkTuesday – where tech terms are defined, explained, and no longer a mystery. Today we’re talking about a phrase...

Read more

Minimize public Wi-Fi risks

There seems to have been a veritable explosion of availability in public Wi-Fi. You can readily find these free access points at...

Read more

Did you know that MFA is hackable? What can you do about it?

A security layer beyond two-factor authentication (2FA), MFA is an identity verification method that stands for multi-factor...

Read more

TechTalkTuesday – Adware

Welcome to #TechTalkTuesday – where tech terms are defined, explained, and no longer a mystery. Today’s term is adware. We hear it...

Read more

Healthy habits for your digital life

Just as you take the time to ensure you’re living your healthiest offline life, it’s important to incorporate some healthy...

Read more

A passwordless future is just around the corner. What you need to know.

A future without passwords. It’s just around the corner. This may feel impossible today, particularly if you have a collection of...

Read more

ZenKey digital identity webinar for CBA

On October 7, ZenKey CEO Alex Schlager presented a webinar to the Consumer Bankers Association. During the informative webinar Alex covered...

Read more

Top 8 cybersecurity tips for your business

If there’s one thing that we’re passionate about at ZenKey it’s cybersecurity. This quick list of our top five cybersecurity tips may...

Read more

Hackers are lazy. Don’t make things easier for them.

It’s said that most car or home break ins are crimes of opportunity. Perhaps a window was left open, or a door unlocked? A would-be...

Read more

Dawn of the Digital Wallet

Digital wallets have been around for years now, but the technology is only just beginning to catch on with wider audiences. The number of...

Read more

TechTalkTuesday – DDoS

Welcome to #TechTalkTuesday – where tech terms are defined, explained, and no longer a mystery. Today’s term is DDoS. On Monday,...

Read more

Managing the situation after a data breach

It seems like there is a news report about a new data breach inside of yet another organization almost weekly. Data breaches are almost...

Read more

TechTalkTuesday – Malware vs. Viruses

It’s #TechTalkTuesday – where tech terms are defined, explained, and no longer a mystery. Today we’re discussing the differences...

Read more

Upcoming Webinar for CBA

Join ZenKey CEO Alex Schlager on Thursday, October 7, 2021 (2pm-3pm EST) as he discusses digital identity and the role it plays in the...

Read more

Six tips for building a healthy BYOD policy

Does your business have a bring your own device (BYOD) policy? Whether you need to develop one or you need to update your existing policy,...

Read more

Heard of liveness detection? What you need to know.

Biometric authentication is increasingly being incorporated into security applications. With that, significant attention is focused on both...

Read more

TechTalkTuesday – The Dark Web

It’s #TechTalkTuesday – where tech terms are defined, explained, and no longer a mystery. Today we’re talking about the dark web....

Read more

It’s Talk like a Pirate Day! Fun! Pirated software is less fun!

It’s Talk Like a Pirate Day! Whether you’re on deck shivering your timbers with your trusty parrot on your shoulder or going to the...

Read more

Cyber scams: What are they, and how to avoid them

As our lives become more present in the digital space, we become more reliant on the technologies that drive cyberspace. This lends itself...

Read more

Protect yourself from cybercriminals when traveling

Whether you’re traveling to Atlanta for a meeting with your team or heading to a tropical locale for a bit of toes-in-the-sand...

Read more

Tech Talk Tuesday – Trojans

It’s #TechTalkTuesday – where tech terms are defined, explained, and no longer a mystery. Today’s TechTalkTuesday discusses Trojans....

Read more

Five IT security risks common to most workplaces

Many businesses will agree that one of their key challenges is that cyberattacks, and other types of security incidents are an ongoing...

Read more

Letting your guard down. Cyberattacks and data hacks can happen to anyone.

You think you’re pretty tech savvy. You protect your private information on social media. You’re careful about the links you click and...

Read more

Tech Talk Tuesday – Spam

It’s #TechTalkTuesday – where tech terms are defined, explained, and no longer a mystery.  Today’s term is spam.  Not just a canned...

Read more

What is multi-factor authentication? Do you know how it can help?

For decades the traditional, and not entirely secure, way to log into accounts has been to enter in your username and your password. The...

Read more

What the hack! How can you tell you’ve been hacked? What can you do?

We are all vulnerable to the threat of a cybercriminal or a hacker gaining access to our information. However, the cyber threats...

Read more

Tech Talk Tuesday – Cybersecurity

Welcome to #TechTalkTuesday – where tech terms are defined, explained, and no longer a mystery.   Today’s term is cybersecurity.  ...

Read more

2021 Federal Identity Forum & Exposition, with Alex Schlager

Join ZenKey CEO Alex Schlager as a guest speaker, participating in the 2021 Federal Identity Forum & Exposition: Session: Private...

Read more

Digital Identity: What it means for your business

Last week we went into detail about what digital identity is and what it means for the individual. Let’s take a closer look and consider...

Read more

Phishing vs. Spear-Phishing

Whether you’re tech savvy or not, you’ve likely heard of phishing. We’ve mentioned spear-phishing in our blog post Do you need to...

Read more

Digital identity, what is it? What do you need to know?

Spend some time with us and you’re sure to hear us talking about digital identity. Around here, we talk about it quite a fair bit. But...

Read more

We escaped Friday the 13th! Did you?

Did you and your business make it through last week’s Friday the 13th? Did you manage to successfully escape any security calamities? The...

Read more

Integrating digital identity to establish trust in healthcare

With drastic leaps in the advancement of the technology, many industries are making the shift to adopt digital identity verification. This...

Read more

Do you need to worry about cybercrime?

It can be easy to think that cybercrime is a problem that only the wealthy and big business need to worry about. What does the average...

Read more

Passwords Are Still Too Easy to Hack – Here’s Why

Hollywood promised a future filled with flying cars, hoverboards, and robot overlords. One thing it never promised was unhackable...

Read more

The Pandemic Shows More Than Ever That Consumers and Our Workforce Need Advanced Authentication

The move to a more virtual life was abrupt. Among employed adults in the US who can do their jobs from home, only 20 percent worked from...

Read more

3 Reasons Your Registration User Experience (UX) is Hurting Your Conversions

Despite clear research showing that better UX can increase conversion rates by up to 400%, only 55% of all businesses conduct UX...

Read more

Business Insights Into the Future of Combating Cybercrime

If there’s only one cybersecurity statistic you pay attention to today, this is definitely it: C-level executives and senior managers say...

Read more

Introducing More Great Places to Use ZenKey

We’re pleased to announce that beginning September 16, 2020, you can enjoy the benefits of ZenKey on even more of your favorite apps and...

Read more

What Is SIM Swap Fraud and How Does ZenKey Prevent It?

SIM swap fraud is a fast, invasive, devastating form of theft—and it can happen to anyone. One tech entrepreneur lost $23.8 million in...

Read more

Creating and Managing Trusted Identities in a Chaotic Online World

We live in a time when the majority of internet traffic originates from mobile devices. According to Statista, mobile searches account for...

Read more

Online Identity Management: How Did We Get Here and What’s Next?

When the first computer passwords were used at the Massachusetts Institute of Technology (MIT) in 1961, nobody could have foreseen the...

Read more

The Time is Now: We Need a Better Way to Secure Online Identities

It’s long been recognized that passwords are problematic. If a password is too simple, it can be easily guessed. If it is too complex, a...

Read more

Events

Mark your calendars for upcoming conferences, summits, seminars and trade shows.

See Upcoming Events

News

Stay up to date on the latest ZenKey news and press releases.

Learn More