Your Sysadmin has resigned, what do you do next?

Change within your workforce is inevitable!  Employee departure is almost a universal constant, right up there alongside death and taxes.  Employee’s move on for a range of reasons, some leave abruptly, some unfortunately have their … [Continue reading]

Real World Example – Importance of Password Management

Let’s start of this week’s blog with a confession.  Here at Click Studios we want businesses to buy and use Passwordstate!  When you buy licenses for our products, and take-out Annual Support and Upgrade Protection, you help us to maintain … [Continue reading]

Reporting Passwords about to Expire

In previous blog entries we’ve run through setting up Scheduled Reports to alert Security Administrators and users when particular events occur.  The previous examples focused on alerting an intended audience when extremely sensitive password … [Continue reading]

Improve Mobile Security

What is the single biggest threat to mobility in the workplace?  There isn’t one single threat, rather there are multiple threat categories that pose serious issue.  These range from Fake WiFi Networks, Malware Infections, Malicious Apps … [Continue reading]

Cyber Criminals Tools & Techniques

Building on last week’s blog Cyber Criminals Exploit the Human Factor, this week we’ll explore a little more detail around the tools and techniques used by Cyber Criminals to convince selected and targeted individuals to take action. To be … [Continue reading]

Cyber Criminals Exploit the Human Factor

Cyber criminals use social engineering approaches to install malware, steal information, perform fake transactions and even shutdown businesses. Greater than 97% of reported attacks target “the human factor” as opposed to making use of known system … [Continue reading]

Passwordstate V9 Changes for Authorized Web Servers

With the soon to be released Passwordstate V9 Beta we’ve overhauled the Authorized Web Servers functionality.  The Authorized Web Servers is used to mitigate against the theft of your Passwordstate Database and the credentials it contains.  … [Continue reading]

Auditing and Graphs

Passwordstate provides comprehensive reporting to ensure you can meet the governance requirements within your organization.  All reporting makes use of the built-in audit events.  There are more than 110 audit events in Passwordstate, … [Continue reading]

Ignored URLs and Browser Extensions

There is no doubt that Browser Extensions make your browser-based-life easier.  The ability to securely manage website logins, while enforcing a reduced attack vector through unique login credentials, should not be understated.  The … [Continue reading]

Google Workspace, SAML Authentication and Passwordstate

Last week’s blog was all about SAML2 Authentication with Microsoft Azure.  Keeping to a like theme, this week we’ll concentrate on setting up SAML Authentication for Google Workspace (formerly G Suite) and Passwordstate. Google Workspace … [Continue reading]