MyCena, a credentials management security company, has announced the release of MyCena Desk Center, a solution for containerized environments such as call centers, contact centers and critical departments, which handle a high volume of critical, private and confidential information.

Until now, contained workplaces were facing enormous challenges with credentials theft and fraud. Most workers have to log in to multiple systems for multiple clients. Since no one can remember dozens of strong and unique passwords, everyone was using weak and reused passwords. Passwords were often written down on post-its and easy to steal. For safety reasons, workers typically cannot bring their mobile devices to their desk, so they could not use MyCena Business Fortress, MyCena’s flagship solution that turns mobile devices into credentials fortress.

With the rising costs of fraud, an incident-based remediation and recovery approach was not sufficient anymore. With no other solution in sight, MyCena has been tasked to come up with the equivalent of MyCena Business Fortress for containerized workplaces.

Applying MyCena’s MASS (Method of Access for Structured Stored Data) technology and its three-level security architecture, MyCena Desk Center allows each desk-bound worker to create a digital fortress of credentials inside their contained environment. In line with MyCena’s concept, each person can only access their own credentials fortress, using a combination of PIN, lock pattern, and passphrase. There is no master password to memorize, so no single point of failure.

Some of the key security issues like passwords policies, password sharing, and privileges are controlled and distributed from an easy-to-use manager console. Users no longer need to create, type, see, or remember any password, eliminating the risk of weak and reused passwords. Users can only access their own passwords, reducing the risk of password theft. All passwords are AES-SHA 256 encrypted locally.

Like the other solutions in MyCena’s portfolio, MyCena Desk Center is system-agnostic. It can protect any type of credentials, from systems, websites, applications, devices, networks, with strong independent passwords, reducing IT helpdesk service time related to password resets from an average 50% down to nil.

Using MyCena also reduces a wide array of costs related to deployment, remediation, recovery, litigation. Employees follow an automated process to create their credentials fortress without any new hardware or integration cost.

“MyCena Desk Center comes to fill a huge gap in the credentials management space, providing military-grade security for what has been an enduring problem with exponential and catastrophic consequences if not mitigated”, said Julia O’Toole, Chief Executive Officer of MyCena.

“Our portfolio gains depth and provides a solution for a long-standing issue, helping our global partner ecosystem serve our clients even better, covering areas that could not be secured with our Mobile Fortress solution. If you have mobile workers, we cover you. Now, if you have container environments or desktop-only workers, we cover you too”, said Rodrigo S. Martineli, Chief Revenue Officer of MyCena.

MyCena’s concept was created after a breakthrough trip to the ancient city of Mycenae. After spending decades looking for a solution to her passwords problem in the fields of neuroscience, mathematics, and technology, Julia discovered in the ruins of the city how the Mycenaeans had built three levels of security to protect it. A first gate led inside the city. Once inside, a second gate led to the garrison. Once inside, a third gate led to the king’s palace. She realized the problem with passwords has never been bad memory or forgetfulness. Rather, it has always been a problem of safe storage and speed of access. By creating a digital credentials fortress, MyCena allows everyone to keep their credentials safe, decentralized, and easy to access at the same time.

International House
24 Holborn Viaduct
London EC1A 2BN


About MyCena

MyCena is a credentials management security company. A pioneer in risk decentralization through layered access security, MyCena’s mission is to make our cyberspace safer. MyCena is currently selling in North America, Latin America, and Europe. The company is headquartered in London (UK) with offices in Dallas (USA), Tunis (Tunisia) and Sao Paulo (Brazil). For more information, visit

Half a million Zoom account holders’ details exposed


Video conferencing software Zoom has become the latest victim of coronavirus-themed cyber-attacks. The platform, which is used by thousands of businesses and families worldwide, had 530,000 passwords stolen and sold on the Dark Web, as well as meeting URLs and Zoom keys. In an attempt to slow further cyber-attacks, the company has now made passwords for all meetings compulsory.

Facebook quizzes spark social engineering fears


As the world continues to adjust self-isolation, Facebook users are being warned of falling victim to social engineering techniques. Seemingly innocent quizzes designed to alleviate boredom are asking users questions such as their favourite place and pet names. Cybersecurity experts are warning that users answering these questions could be unwittingly giving away clues to their passwords.  

Firms offered 24-hour cybersecurity hotline


Security Metrics has opened a free 24-hour hotline for those with cybersecurity concerns. A spokesperson for the firm said: “The COVID-19 pandemic is having an unprecedented impact on businesses around the world. Whether a business has shut down operations for the time being or is attempting to continue work remotely, suffering a cyber-attack right now will only kick business owners while they’re down.” The hotline is reachable to UK residents on +44 20 3014 7831.  

Give us financial relief for cybersecurity, say Democrats


The House Homeland Security Committee has penned a letter to US Congress asking for emergency relief to deal with cybersecurity concerns. The letter says that “state and local government employees are working hard to continue operations”, but also claims that those working from home are more susceptible to phishing, malware and ransomware attacks. It comes off the back of a report highlighting the security dangers of home devices.   

Ethical hackers praised for their innovative ideas to overcome COVID-19


Cyber geniuses have been praised for their interventions during the coronavirus outbreak. A self-taught coder based in South Korea was the brains behind, which has been tracking the spread of infections since January. It seems the tech giants are sitting up and taking notice too, as they are now developing their own contact-tracing software for smartphones to determine where people may have picked up the virus. These civic hackers or “good guys” are instrumental in helping to identify where more resources are needed, such as face masks.



Half the world is currently fighting a pandemic. The new coronavirus has exposed considerable holes in our protective systems, forcing 3.9 million people in 50 countries into confinement and bringing unprecedented losses in its tail.

How did that happen?

First, let’s put the situation in context. Pandemics of this scale were long gone from our living memory. The last one, the Spanish flu, had infected a quarter of the world population and ended almost exactly 100 years ago. We can legitimately not underestimate the surprise factor. This situation is new for everyone.

Could it be avoided?

Some countries had simulated pandemics to prepare for the real ones. But all their preparation was just mitigation. Yes, having a stockpile of masks, ventilators, protective blouses for healthcare workers… absolutely changes how you respond to the crisis. And prepared countries can dramatically reduce the spread of infections, help more people survive and rebound faster economically.

But mitigation alone cannot be the only strategy, just as extinguishing fires cannot be the only strategy to prevent massive fires. In France, the forest regulation limits the spread and damage of any new fire by forcing people to reduce the size of tree clusters near their homes. It is a far more efficient and cost-effective strategy than waiting for them to become large then try to extinguish them, especially in regions where wildfires are a known recurring plea.

How does it apply to cybersecurity?

In cybersecurity, this logic would translate into reducing the size of clusters of systems and data that can be accessed through the same door. At the moment, the two leading practices in most organizations have the same effect. People either centralize systems and data access at one point, through a login and password or biometric. Or they use similar credentials to access all your systems or data (which means if a hacker gets one of your systems credentials, they can reuse them for others). Both practices lead to the same result: a very high risk that the whole organisation and third parties get infected from one breach.

As with wildfires or biological pandemics, investigating and patching a cybersecurity breach will always be less effective than preventing a virus from massively spreading in the first place. As 81% of all breaches start with an intrusion through passwords, any cybersecurity plan should therefore start with reducing the size of clusters, making all accesses independent and decentralising credentials.

How to build a strong and secure access architecture?

A secure access architecture is based upon strong unique and independent credentials for all systems, networks, applications, databases and devices inside the organisation. By reducing the size of clusters that can be accessed through any credential, organisations can dramatically reduce the size of breaches when they happen, stop virus from spreading far and wide into their systems and that of third parties.

That strategy implies putting users front and center of your cybersecurity strategy. Just like with COVID-19, getting people to practice social distancing, self-isolate when they have symptoms and wash their hands is far more effective to stop the virus from spreading than only monitoring them. And as with fires or viruses, you need rules and tools to help people protect themselves, inside and outside the organization.

But aren’t cybersecurity solutions complicated and expensive?

Most cybersecurity solutions are indeed long and expensive to implement. But you can now leverage a well-architected solution that is simple to deploy, easy to use and very competitive to cover over 80% of your cyber risks. And the good news is you can start doing it today.

Next time you see someone typing a password, think about its potential consequences for your organisation and your ecosystem. Why not embed cybersecurity in your organisation by including your users in your strategy instead?

Don’t know where to start? Get a free assessment on your credentials security level here or contact us at



The World Economic Forum has made a striking declaration about cyber security – that it is the responsibility of world leaders. As part of the World Economic Forum Annual Meeting, experts claimed that security has been the domain of the IT department for too long, and we must all get involved as cyber-attacks grow in sophistication. Conclusions from the meeting included a need for a “culture of cyber security” and a rethink into organisational structures, as well as investment into evolving technologies.  



A new report has found that multi-factor authentication attacks are expected to rise in 2020. Multi-factor authentication involves using more than one device or access method to log in to a user account, for example a fingerprint scan and a unique pin. According to the report, 57 per cent of global businesses now use multi-factor authentication, making it a new target for hackers. Experts are predicting a rise in ‘9am attacks’ whereby end-users receive a notification to log in when they arrive at the office, inadvertently giving hackers access.



The UK head of cyber security is to step down in 2020 after more than six years of service. Ciaran Martin, who founded the UK’s national cyber security unit, is moving to a role in the private sector for summer 2020. In response, Downing Street is going to implement a “strategic review” of British defence and security, focusing on cyber security. Martin’s top achievements include linking state-sponsored cyber attacks to Russia. In a statement, he said the time had come for a new successor to “take the organisation to the next level”.