Utilizing a Cloud-Based IAM Solution in Government The proper security of your systems and resources is crucial, especially when you’re handling government or private citizens’ personally identifiable information (PII) and data. Data leaks are lurking and can have...
Blog
Secure Remote Work: What Must Companies Do?
How can your organization maintain security now that employees are working from home? When an employee begins working from home, it is important that they have an understanding of how to protect the security of your organization’s resources. From VPNs, MFA, and...
How to reduce the risks associated with onboarding new employees
We are all susceptible to the curse of “password fatigue”, or struggling to remember countless logins and passwords. It becomes incredibly difficult to keep track of them all, forcing many to make their passwords easy to remember, often at the expense of security....
Multifactor Authentication (MFA), what are the options?
Providing easy and secure access to enterprise applications is something that every organization aspires to do. Single Sign-On (SSO) can offer a significant improvement in efficiency because you can access all of your resources and applications with a single set of...
How HelloID Can Improve Your Organization’s Security
An Identity and Access Management (IAM) solution is critical to improving your security efforts and can help your organization realize additional benefits (e.g., eliminating wasted time, increasing efficiency, and cutting down on costs). Below is a brief look into how...
Why You Need to Ditch Manual Provisioning
As much as the road less traveled often builds character, who would actually prefer the long and winding path over a quick and painless shortcut? Whether you recognize it or not, we have all been given shortcuts to make our daily lives easier: You can head to the...
Ease authentication for young students with QR code logins
Learning and technology go together as it has become apparent that technology is an effective way to engage students. However, technology introduces challenges to the classroom such as cost, administration and ease of use; particularly for younger students or those...
Balancing simple access with robust security
The days of securing a computer, application or website with a basic username and password are long gone. Hackers are more sophisticated than ever and the value of data is on the rise. To this end, advanced authentication, or multi-factor authentication, is becoming...
Risky Business: Overcoming Onboarding Exposure (Explicitly, Perilous Passwords)
Few everyday technology interactions get on people's nerves quite as much as the dreaded "Password Expired" notification. It is bad enough having to remember all of your passwords before having to change it up with a new value or a slightly different version of an...
Your data sucks
I have worked with the user-related data of well over 100 organizations in my last 5 years as an Identity Management consultant. Without exception or reservation, it has all been garbage in one way or another (sometimes in multiple ways). It may be a bit of hyperbole...
Part 2: Mitigating the risk of internal breach
In part one of this blog series, we showed how access governance, in conjunction with automated provisioning and de-provisioning of user accounts are essential in preventing internal data breach on an organization's network. Today we are going to discuss how to take...
Part 1: Mitigating the risk of internal breach
Situation: Threats are commonly internal Companies spend considerable resources protecting against the threat of data breach – and rightly so. A data breach can result in large fines and, more importantly, a damaged reputation. While companies focus most of their...
Attestation & Reconciliation – what is it and why do you need it?
Identity and Access Management (IAM) is a framework of policies and high standard technologies built to ensure organizational users are granted the appropriate access to resources. Read more about What is Identity and Access Management? Many factors come in play to...
SSO on the go!
Where do you physically work? In an office? At home? At a table in your local coffee shop? It is becoming more common for employers to allow their employees to work outside the traditional office space. With the use of laptops, tablets and mobile devices there is...
The Phased Approach to Implementation
Over the past 11 years I have, as a consultant and project manager, implemented and managed many IAM solutions. These projects have varied from very small to enterprise-level solutions. This experience has given me quite an insight into how businesses operate, how to...
How a successful password management solution would look in your organization
I want you to close your eyes for a moment… Well obviously you can’t close your eyes and read this, so keep them open; but imagine a world where your email inbox alerts come in sparingly, your chat box rarely pings, and the phone almost never rings… (Except for Gary...
The Advantages of the Cloud
Cloud computing has opened up a new world of IT infrastructure that poses many advantages for organizations such as enhanced accessibility, scalability, cost efficiency and security. Let us take cloud based access workflows for example, they offer many advantages over...
Web SSO vs Enterprise SSO
Currently, the number of applications and software solutions in use by businesses is increasing rapidly. It is not uncommon that one business may utilize dozens of applications, each with their own set of credentials for each user. Many of these applications (both on...
SSRPM Saving the Helpdesk Time
Forgetting a password can be quite an ordeal without a self-service reset system in place. You have to call the help desk, provide your information, wait for a ticket to be created, be assisted by the next available agent or at times you may have to wait for a call...
Access Governance Solutions Ensure Network Security Compliance
In a corporate environment, the most important aspect of protecting the security of your network is by leveraging software to ensure users do not have permissions to files and applications that they should not be able to access. There are many ways you can leverage...