Uber, arguably the largest ride-sharing service worldwide, has suffered its fair share of data breaches. A few years ago, the company experienced a leak that exposed over 50 million clients' personal information and data for over 7 million drivers. However, Uber's...
Access Management
What is a Privileged Account?
Have you ever encountered the term Privileged Account and wondered what it truly means? Learn about this crucial cybersecurity topic.
4 Ways an IAM Solution Can Benefit Healthcare Organizations
It’s no secret that healthcare organizations must adhere to some of the most rigorous data protection regulations out there. The Health Insurance Portability and Accountability Act (HIPAA) puts in place strict rules that healthcare companies must follow to ensure the...
5 Reasons to Offboard Immediately
When it comes to the user account lifecycle, there’s a significant emphasis on onboarding and provisioning. These processes are essential for getting new employees ready to hit the ground running on their first day. Without created accounts and provisioned access to...
Why Is Identity and Access Management More Important Now Than Ever?
Identity and Access Management (IAM) is more than just about managing passwords. Ensuring only authorized users can access your business data and systems and only at the appropriate permission level is vital to cybersecurity.
7 Factors To Consider With Automated User Provisioning
Are you considering how to automate your organizations provisioning and identity management? Here are 7 factors to include in your research.
Secure Remote Work: What Must Companies Do?
How can your organization maintain security now that employees are working from home? When an employee begins working from home, it is important that they have an understanding of how to protect the security of your organization’s resources. From VPNs, MFA, and...
Multifactor Authentication (MFA), what are the options?
Providing easy and secure access to enterprise applications is something that every organization aspires to do. Single Sign-On (SSO) can offer a significant improvement in efficiency because you can access all of your resources and applications with a single set of...
How HelloID Can Improve Your Organization’s Security
An Identity and Access Management (IAM) solution is critical to improving your security efforts and can help your organization realize additional benefits (e.g., eliminating wasted time, increasing efficiency, and cutting down on costs). Below is a brief look into how...
Ease authentication for young students with QR code logins
Learning and technology go together as it has become apparent that technology is an effective way to engage students. However, technology introduces challenges to the classroom such as cost, administration and ease of use; particularly for younger students or those...
Balancing simple access with robust security
The days of securing a computer, application or website with a basic username and password are long gone. Hackers are more sophisticated than ever and the value of data is on the rise. To this end, advanced authentication, or multi-factor authentication, is becoming...
The Phased Approach to Implementation
Over the past 11 years I have, as a consultant and project manager, implemented and managed many IAM solutions. These projects have varied from very small to enterprise-level solutions. This experience has given me quite an insight into how businesses operate, how to...
Advanced Authentication Methods
In the ever-evolving world of technology, which seems to permeate most aspects of our modern lives, the threat of data breaches is also ever evolving. Even though the internet, and networking in general, is in its infancy relative to our society, the forces that shape...
Why SSO? Four Simple Ways SSO is Beneficial
With so many passwords to remember today, the answers are abundant: Single Sign-On solutions (SSO) have been around for a while now, and for good reason. They are extremely helpful for many areas of your organization and require minimal effort to implement and use....
Lending access to temporary employees or contractors
Do you share company information with individuals you don't employ, such as independent contractors? Is this really a good idea? Many organizations find that they need to give contractors, temps, etc. access to their network in order to perform their jobs, but...