Controls
July 02, 2020

Cybersecurity Myths That Are Harming Your Business

1 min. read

There's something undeniably compelling about a good myth. Maybe that's because a dose of escapism does our brain good, and it's fun to spend a few moments wondering about deadly alligators populating the New York City sewer system or Walt Disney's cryogenically frozen head waiting to be brought back to life.

But while those myths are fun, some of the myths about cybersecurity are downright dangerous. That's because a misunderstanding of what does and does not protect your digital footprint can lead to devastating breaches. It's time to bust the myths and get back to better protection. Here are seven of them:

1. Multi-factor authentication prevents credential stuffing.

Multi-factor authentication is a great tool in cybersecurity, but it doesn't prevent credential stuffing. Here's why: When a hacker tries to log in with incorrect credentials, the server will respond with an error message. When the credentials are correct, the server will ask for a second factor of authentication. Either way, the attacker gains information, and any information can be used to aid in an attack.

Read the full article published June 11, 2020 here: https://www.forbes.com/sites/forbestechcouncil/2020/06/11/cybersecurity-myths-that-are-harming-your-business/ by Forbes.

Need-to-Know

Expertly picked stories on threat intelligence

Hundreds of apps will be attacked by the time you read this.

So, we get to work. We obsess over effective attack methods. We monitor the growth of IoT and its evolving threats. We dive deep into the latest crypto-mining campaigns. We analyze banking Trojan targets. We dissect exploits. We hunt for the latest malware. And then our team of experts share it all with you. For more than 20 years, F5 has been leading the app delivery space. With our experience, we are passionate about educating the security community-providing the intel you need to stay informed so your apps can stay safe.

Every

9 hrs

a critical vulnerability—with the potential for remote code execution—is released.