Author Archives: Maria Korolov

What is biometrics? And why collecting biometric data is risky

Biometrics definition

Biometric authentication uses physical or behavioral human characteristics to digitally identify a person to grant access to systems, devices or data. Examples of these biometric identifiers are fingerprints, facial patterns, voice or typing cadence. Each of these identifiers is considered unique to the individual, and they may be used in combination to ensure greater accuracy of identification.

Best antivirus software: 11 top tools

The AV-TEST Institute recently tested the most popular Windows 10 client antivirus products on three primary criteria: protection, performance, and usability. Only five of the 16 products tested earned a perfect rating of 6 for each of those criteria: Kaspersky Lab Endpoint Security 11, Kaspersky Small Office Security 6, Symantec Endpoint Protection 14.2 and Endpoint Protection Cloud 22.15, and Trend Micro Office Scan 12. The top 11 antivirus offerings shown here in alphabetical order scored at least 17 points out of a possible 18.

What is a supply chain attack? Why you should be wary of third-party providers

A supply chain attack, also called a value-chain or third-party attack, occurs when someone infiltrates your system through an outside partner or provider with access to your systems and data. This has dramatically changes the attack surface of the typical enterprise in the past few years, with more suppliers and service providers touching sensitive data than ever before.