Blog

Read more about the latest developments on Identity Governance & Administration

What is a good password and why do you need one?

Would you leave the door to your house unlocked if you weren’t home? Would you leave the keys in your car if you weren’t in it? I assume the answer to both these questions are “no”. Why would you want to leave your personal property unattended, when is there a chance something might be stolen? Similar questions can be asked regarding password management. How complex are your passwords? Do you feel as comfortable storing your personal and business information on your computer, as you do leaving your home locked and protected?

Read more

Advanced Authentication Methods

In the ever-evolving world of technology, which seems to permeate most aspects of our modern lives, the threat of data breaches is also ever evolving. Even though the internet, and networking in general, is in its infancy relative to our society, the forces that shape our technological landscape are moving quickly, and those who see fit to exploit the weaknesses inherent in such a landscape are just one-step behind -or sometimes, they may be one-step ahead.

Read more

Category

Authentication Management

E-SSOM , HelloID , secure , compliance , hackers , authentication , 2fa , mfa , SAML

Why SSO? Four Simple Ways SSO is Beneficial

With so many passwords to remember today, the answers are abundant: Single Sign-On solutions (SSO) have been around for a while now, but for good reason. They are extremely helpful for many areas of your organization, with minimal effort to implement and use. Here are four simple ways SSO is beneficial.

Read more