Blog

Explore expert insights, product updates, industry trends, and the latest announcements on our blog — your go-to source for staying informed and inspired.

By MyCena | Posted on: 16 April 2026

Critical Infrastructure

By MyCena | Posted on: 16 April 2026

BPO & Contact Centre

MyCena
By MyCena | Posted on: 12 June 2025

Why Third-Party Access Is The Weakest Link in Enterprise Security

Last month, two major brands Marks & Spencer (M&S) and Coinbase—became the latest victims in a rising wave of cyberattacks against third-party helpdesk. These weren’t sophisticated zero-day exploits or state-sponsored hacks. They were inside jobs, made possible by human-managed credentials in the hands of third parties.

The fallout? Hundreds of millions in damages, disrupted operations, and shaken customer trust. Here's a breakdown of what went wrong, why it happened, and how MyCena makes this kind of breach impossible.

What Happened?

Marks & Spencer (M&S)

Hackers infiltrated M&S by exploiting a third-party contractor with access to their systems. Once inside, they stole personal customer data including contact details and order histories—and disrupted online operations. While financial data wasn’t accessed, the impact was still massive: halted online orders, lost revenue, legal fallout, and shaken customer trust.

  • Estimated losses: £43 million per week in halted sales
  • Market value impact: Over £1.2 billion wiped out
  • Reputational cost: Rising customer complaints and a class-action lawsuit in progress

Coinbase

In Coinbase’s case, attackers bribed overseas customer support contractors to misuse their internal access. This allowed them to extract personal information on customers—names, IDs, masked bank details, and more. Even though login credentials and funds remained untouched, the breach triggered legal action, an extortion attempt, and hundreds of millions in projected losses.

  • Ransom demand: $20 million
  • Projected remediation costs: Between $180 million and $400 million
  • Legal impact: Ongoing DOJ investigation + civil suits over failure to protect user data

Why It Happened

Despite their size and resources, both organizations relied on third parties to access critical systems using traditional identity-based methods—typically usernames and passwords or shared credentials. That’s the problem.

Traditional credential models are inherently flawed.
When credentials are managed by people—whether internal staff or external contractors—they can be phished, shared, reused, sold, or stolen. In both breaches, the attackers didn’t need to break in. They just found someone who already had a key—or made a copy of one.

This is the danger of third-party access in today’s connected supply chains: you inherit every weakness your vendors and partners have.

Here’s how MyCena makes third-party breaches impossible:

At MyCena , we’ve eliminated the problem at the root: we remove humans from credential management entirely.

Here’s how MyCena’s Multi-Layer Dynamic Access Encryption Security (ML-DAES) prevents third-party credential breaches:

  • Unphishable Credentials: MyCena generates and encrypts credentials automatically—users never see, create, or share passwords. That means nothing to phish, bribe, or mishandle.
  • Access Segmentation: Third-party access is strictly limited by system and role, and each user only gets access to the specific system they need, preventing attackers from moving laterally.
  • No Visibility = No Theft: Without credentials being visible, they can’t be phished, reused, or sold—even under coercion or bribery.
  • Audit-Ready Logs: Every access action is tracked in real time, ensuring full governance and instant audit-readiness across internal and external users.

With MyCena , there’s no password reset to steal, no spreadsheet to leak, and no third-party weak link to exploit. Our technology removes the human risk factor by eliminating employee-managed credentials entirely, and third-party access doesn’t mean third-party risk.

Final Thought

The M&S and Coinbase breaches are wake-up calls for every business that shares access with partners, vendors, or contractors. You might trust them but can you trust their cybersecurity practices?

Ask yourself: Would you let vendors make physical copies of your office keys and hand them to unknown staff? That’s exactly what happens when you let humans manage digital credentials.

MyCena makes that scenario obsolete. With encrypted, automated, segmented access, you stay in control—even when access is shared.

Because when no one sees the keys, no one can steal them.

Ready to make phishing a thing of the past?

Book a demo with MyCena today and discover how encrypted, employee-free credential management can transform your cybersecurity posture.

MyCena
By MyCena | Posted on: 4 June 2025

IAM vs. PAM: Why Understanding the Difference is Key to Your Cybersecurity Strategy

In today's digital landscape, managing access isn't just an IT task—it's a critical line of defense. Two terms often thrown around in the cybersecurity world are IAM (Identity Access Management) and PAM (Privileged Access Management) . They sound similar, and they are related—but mixing them up could leave your systems exposed in ways you didn't expect.

Let's break them down and explain how each plays a unique (and essential) role in keeping your organization secure.

What is IAM?

Identity and Access Management (IAM) is the foundational layer of digital access control. It's like the front desk of your digital office—checking who each person is and what they're allowed to do.

IAM ensures that every user , whether it's an employee, customer, contractor, or partner, has the right level of access to the right resources —nothing more, nothing less.

IAM systems handle:

  • Creating and managing user identities across systems
  • Controlling logins with secure methods like Single Sign-On (SSO), multi-factor authentication (MFA), or biometrics
  • Automating onboarding and offboarding processes
  • Assigning access based on roles (RBAC)
  • Tracking who accessed what and when (audit trails)

Popular IAM tools: Okta, Microsoft Entra ID (formerly Azure AD), Auth0

Think of IAM as the digital ID badge and access gate for everyone in your ecosystem.

What is PAM?

While IAM is about everyone , Privileged Access Management (PAM) is about the few — the users who hold the digital master keys.

PAM is a specialized subset of IAM focused on securing privileged accounts , such as system administrators, DevOps engineers, and IT staff. These accounts can access your most critical infrastructure, and if compromised, they can cause catastrophic damage.

PAM solutions are designed to:

  • Store and manage powerful credentials in secure password vaults
  • Monitor and record sessions of users with elevated privileges
  • Enforce Just-In-Time (JIT) access (temporary, on-demand permissions)
  • Detect unusual or risky behavior through user behavior analytics
  • Enforce Segregation of Duties (SoD) to prevent conflicts of interest

Popular PAM tools: CyberArk, BeyondTrust, Delinea (formerly Thycotic)

Where IAM manages the front door for everyone, PAM secures the keys to the server room.

IAM vs. PAM: Quick Comparison

Feature IAM PAM
Who it covers All users (staff, partners, customers) Privileged users (admins, IT, DevOps)
Main goal Manage user identities and general access Protect and monitor high-risk access
Focus Authentication & role-based access Secure credential vaulting & session control
Use case Needed by all organizations Critical for sensitive or regulated systems

Why You Need Both

Relying on IAM without PAM is like having a well-guarded office lobby but no lock on the server room. Conversely, using PAM without IAM would be like locking up the IT admin while leaving the rest of the building open.

For a robust access security strategy, you need both IAM and PAM working together :

  • IAM ensures everyone is verified and appropriately authorized.
  • PAM ensures only the right people , at the right time, can touch your most sensitive systems—with oversight and control.

Final Thoughts

As cyber threats grow more advanced—especially with phishing, insider risks, and AI-driven attacks—relying solely on traditional identity or access tools leaves gaps. IAM and PAM are essential pieces of the security puzzle, but they still depend on one vulnerable element: human-managed credentials.

That's where MyCena comes in.

MyCena takes IAM and PAM a step further by removing the weakest link in the chain, passwords. With encrypted, automated credential management, MyCena ensures employees never create, see, or share credentials. That makes phishing irrelevant, access segmented, and compliance a breeze.

By complementing your IAM and PAM strategies, MyCena helps eliminate credential-based attacks entirely , simplifying governance while boosting your organization's resilience and efficiency.

No passwords. No phishing. No problem.

MyCena. Security done for you.

MyCena
By MyCena | Posted on: 15 April 2024

Microsoft left internal passwords exposed in latest security blunder

With no password protection, a Microsoft server containing a variety of security credentials used by Microsoft employees to access internal systems was accessible by anyone on the internet.

Access is the biggest weakness in cybersecurity. Companies need to control their credentials and encrypt them so they can't be known and disclosed.

MyCena
By MyCena | Posted on: 19 February 2024

Hackers ‘steal your face’ to create deepfakes that rob bank accounts

With no way to validate identity from users' biometric, financial systems are massively exposed to identity theft fraud.

=> Biometric authentication are handy PIN code replacement but not more secure. Why? Because your fingerprints, your face, and your voice are not secrets.

=> Biometrics are increasingly being scraped, stored, and analyzed by threat actors.

=> By exploiting IP cameras' video databases, hackers can gather bits of iris and fingerprint and "with enough repetition, compute power, and time, they can potentially crack a person’s full biometrics."

=> "Biometric data is useful for in-person authentication, and really dangerous for remote authentication". Biometric data are like a complex key. Once transmitted, users aren’t authenticating the actual biometric, they are verifying something that looks a lot like a password.

our financial system is built in a lot of assumed-but-not-verified trust.will continue to be exacerbated by technologies like deep fakes as long as our banking institutions trust transmitted copies of a biometric.”

MyCena
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.