Utilizing a Cloud-Based IAM Solution in Government The proper security of your systems and resources is crucial, especially when you’re handling government or private citizens’ personally identifiable information (PII) and data. Data leaks are lurking and can have...
Identity & Access Management
How to reduce the risks associated with onboarding new employees
We are all susceptible to the curse of “password fatigue”, or struggling to remember countless logins and passwords. It becomes incredibly difficult to keep track of them all, forcing many to make their passwords easy to remember, often at the expense of security....
Multifactor Authentication (MFA), what are the options?
Providing easy and secure access to enterprise applications is something that every organization aspires to do. Single Sign-On (SSO) can offer a significant improvement in efficiency because you can access all of your resources and applications with a single set of...
How HelloID Can Improve Your Organization’s Security
An Identity and Access Management (IAM) solution is critical to improving your security efforts and can help your organization realize additional benefits (e.g., eliminating wasted time, increasing efficiency, and cutting down on costs). Below is a brief look into how...
Why You Need to Ditch Manual Provisioning
As much as the road less traveled often builds character, who would actually prefer the long and winding path over a quick and painless shortcut? Whether you recognize it or not, we have all been given shortcuts to make our daily lives easier: You can head to the...
Your data sucks
I have worked with the user-related data of well over 100 organizations in my last 5 years as an Identity Management consultant. Without exception or reservation, it has all been garbage in one way or another (sometimes in multiple ways). It may be a bit of hyperbole...
Part 2: Mitigating the risk of internal breach
In part one of this blog series, we showed how access governance, in conjunction with automated provisioning and de-provisioning of user accounts are essential in preventing internal data breach on an organization's network. Today we are going to discuss how to take...
Part 1: Mitigating the risk of internal breach
Situation: Threats are commonly internal Companies spend considerable resources protecting against the threat of data breach – and rightly so. A data breach can result in large fines and, more importantly, a damaged reputation. While companies focus most of their...
Attestation & Reconciliation – what is it and why do you need it?
Identity and Access Management (IAM) is a framework of policies and high standard technologies built to ensure organizational users are granted the appropriate access to resources. Read more about What is Identity and Access Management? Many factors come in play to...
The Phased Approach to Implementation
Over the past 11 years I have, as a consultant and project manager, implemented and managed many IAM solutions. These projects have varied from very small to enterprise-level solutions. This experience has given me quite an insight into how businesses operate, how to...
Access Governance Solutions Ensure Network Security Compliance
In a corporate environment, the most important aspect of protecting the security of your network is by leveraging software to ensure users do not have permissions to files and applications that they should not be able to access. There are many ways you can leverage...
Connecting Office 365 to Identity Access Management Solutions
Microsoft Cloud is revolutionizing the way organizations across various industries operate; providing various services at a minimal cost and scalability that fits the needs of any organization. Microsoft’s productivity service Office 365 has opened the doors for...
How IAM Connectors Work
Connectors to automated account management solutions allow you to make changes within all sorts of systems whether they are cloud or self-hosted systems, easily and automatically. When purchasing this type of solution, it is important to ensure that the vendor has, or...
Are your new employees annoyed by the onboarding process?
There is always a level of excitement when starting a new job, with that enthusiasm comes added energy with fresh ideas and wanting to bring as much to the table as possible. The one thing that can damage this momentum is being held back from actually performing the...
Three Ways Your Organization Can Ensure Security
It’s common sense: Data security is important in every industry. Every organization, thus, must deal with internal data or customer data which, if breached, can cause major issues for the organization, its team members and its customers. Here are three useful tips on...
What is the Next Step in the Evolution of the Password?
Passwords are the most common form of authentication and the current de-facto standard. In fact, passwords have existed in tech since the early 1960's when they were implemented at MIT for the time sharing system on their computer systems for researchers. In order to...
Maturity in Authorization management
Access Governance (AG) ensures that employees have the appropriate entitlements to perform their duties. A reliable Access Governance model makes sure that the proper base of entitlements are provisioned to them when starting a new job, transferring to a different...
How to Ensure Against Duplicate User Accounts In Your Network
When integrating an Identity & Access Management automated routine with a human resource system, locating a unique identifier to be used across each system is key. Typically, the employee ID or social security number is optimal, as it unique to each employee....
How can meeting mandatory audit requirements also benefit the health of your organization?
Meeting audit requirements are often required for many organizations, but the process is often cumbersome and requires a great deal of time and effort. There are ways, though, to make the audit process much easier, while also gaining the additional benefit of...
Easy Authorization Requests & Requisitions
Authorization requests and requisitions are a part of life for most businesses. Employees make all types of requests for purchasing equipment, role changes or requesting additional access to systems/ applications. Authorization request processes may have different...