Blog

MFA (Multi-Factor Authentication), if implemented correctly, is a useful security tool. But this blog from Anthony Alves covers the ways in which MFA is broken.

Shadow IT often occurs when employees use their own devices or software for work-related tasks, which can lead to significant security and compliance issues.

November 2023 has been a busy month for the Banyan Security product and development teams, and we’re excited to share highlights of our recent product updates.

While vendors strive to create easy to use products and organizations provide user training, it is clear that issues arise and end users have questions which ultimately affect productivity.   Here’s a quick look at some interesting stats on IT and helpdesk calls:   The average company receives 25 IT support tickets per day. Source: […]

Ok, y’all, we are now in the middle of post-covid work environments where the freedom of location has been a selling point for companies that have remote positions. But this freedom pairs with the adage “with great power comes great responsibility,” where we are relying on our end users to police their own internet activity. […]