Skip to content

Newsroom

BioT

KCTC Member Spotlight | SOFTwarfare

growthzone
October 6, 2020

1. We have heard a lot in recent months about why cybersecurity is more important now than ever. Can you explain how SOFTwarfare® has expanded its efforts to meet the new demand for cybersecurity?

There are several factors contributing to the rise in cyber threats. The most obvious is the shift to a mostly or all remote workforce. This requires employees to access corporate data and systems from outside the corporate network. VPNs have commonly been used for remote access but cannot scale for large organizations that have hundreds or thousands of employees working remotely. Most organizations were unprepared for this shift and are now struggling to defend their assets while limiting business disruption.

We've also seen an increase in phishing and malware attacks taking advantage of the fear surrounding COVID-19. Cybercriminals are doing this by creating online domains or sending emails with buzzwords related to the virus. All it takes is someone to click the link one time to compromise an entire network potentially.

SOFTwarfare® has released BioThenticate® to help organizations securely authenticate remote users and enhance privileged access. BioThenticate® is a next-gen, biometric multi-factor authentication solution that combines fingerprint, facial, and proprietary iris scanning technology with biometric sensors that exist on most of today's smartphones to provide a frictionless user experience. Anyone can try BioThenticate for free for 33 days and we are currently offering special discounted pricing to KC Tech Council members for the remainder of 2020.

 

2. How can companies equip themselves for the continuous uptick in remote work?

Educating your staff on the importance of maintaining security posture while working from home is crucial. Employees might be using personal devices that are shared with other members of their household for work purposes. Reminders to not click suspicious links or open emails for unknown senders is a good place to start, but it's imperative that this be a continuous process.

Implementing more stringent MFA solutions, such as biometrics, that offer continuous user validation is an effective way to ensure secure authentication of end users. The majority of companies today are using some form of MFA, but unfortunately, most MFA solutions can easily be circumvented by common attacks. By adding a layer of biometric security, organizations can truly verify a user is who they say they are.

 

3. What makes SOFTwarfare unique from other cybersecurity providers?

Our mission at SOFTwarfare® is to defend assets from cyber attack through the innovative solutions created in-house and by partnering with industry-leading technology providers. Integration and security are at the core of everything we do because at the end of the day, in order for organizations to protect themselves, they need visibility into their infrastructure, they need to get the most out of their current cybersecurity investments, and they need scalable solutions that will grow with the business. SOFTwarfare® understands those needs and can provide flexible and fully managed solutions that won't put any additional stress on existing staff.

 

4. As dynamics and priorities continue to shift, what is your advice to cybersecurity teams navigating this ever-changing environment?

Cybersecurity is an area that has always been very dynamic but it is especially true now during the COVID-19 pandemic. It is crucial that organizations are operating off of the most recent information available. If possible, begin pivoting cybersecurity strategies to be more proactive instead of reactive. Choose vendor partners that work well with others so you don't find yourself boxed into solution suites that do not align with your long-term company goals or are not compatible with solutions you might purchase in the future. Avoid band-aid type solutions as much as possible so the organization is in a more secure position for the long-term.

 

5. Biometrics are becoming a more integral part of cybersecurity. Can you explain why and how those components are incorporated into SOFTwarfare's approach?

Biometrics are the only way to truly verify someone is who they say they are. Industries such as manufacturing and healthcare have been utilizing biometric technology for years now but with very little visibility or control. Consumers have been comfortable using biometrics to access personal devices for some time as well. We bridge the gap with a platform interface that grants visibility and access control to the enterprise and utilizing the biometric sensors on consumer devices for a seamless user experience. This allows businesses to easily implement biometric technology that their end users are already familiar with, without disrupting the business.

 

6. How can individual employees incorporate safer cybersecurity practices in their day to day work life?

In this new era of remote workers, security must be top of mind for all employees, not just the security team. This is especially true for organizations with large workforces. It is unrealistic to think this burden can be entirely placed on the security teams. Practicing mindfulness when surfing the web can go a long way. Employees should ensure they are only clicking links from reputable sources or opening emails from addresses they recognize and should pay attention to any system updates or unauthorized authentication requests before clicking, as these can all be easily spoofed.

Categories

Archives

Scroll To Top