Uber, arguably the largest ride-sharing service worldwide, has suffered its fair share of data breaches. A few years ago, the company experienced a leak that exposed over 50 million clients' personal information and data for over 7 million drivers. However, Uber's...
Identity & Access Management
Security Access Control Models for Schools
This blog will cover multiple aspects of building an access control model based on Role Based Access Control (RBAC) and Attribute Based Access Control (ABAC). This includes steps needed to role mine and analyze access permissions across multiple systems, review what...
Enterprise Identity Management vs. Simple User Provisioning for Schools
Schools must protect students’ personal information. Learn whether Enterprise Identity Management or Simple User Provisioning is the best option.
4 Ways an IAM Solution Can Benefit Healthcare Organizations
It’s no secret that healthcare organizations must adhere to some of the most rigorous data protection regulations out there. The Health Insurance Portability and Accountability Act (HIPAA) puts in place strict rules that healthcare companies must follow to ensure the...
5 Advantages of an Identity & Access Management Solution in Education
The education sector has undergone a colossal digital revolution over the last two years. After the COVID-19 outbreak, colleges and schools had to quickly pivot how they approached learning delivery, moving from the classroom, in-person lessons to eLearning modules...
Unlock the Potential of Automated IAM for Education
Automated Identity and Access Management (IAM) is key to securely and promptly providing employees and students with the proper access rights to accomplish their daily tasks. While you might not initially think you need an...
Why Cyber Security Insurance Policies Are Requiring MFA
The cost of a data breach has risen to over 4 million dollars, and ransomware remediation costs keep skyrocketing. These costs can drive smaller companies out of business in many cases, which has led to a rise in the popularity of cybersecurity insurance.
Here’s Why You Should Regularly Audit Your Privileged Accounts
Nearly any type of system or cloud account that you use will have varying levels of privileges. These privileges dictate the information and actions a user can access in that system.
Why Is Identity and Access Management More Important Now Than Ever?
Identity and Access Management (IAM) is more than just about managing passwords. Ensuring only authorized users can access your business data and systems and only at the appropriate permission level is vital to cybersecurity.
Provisioning: Manual vs. Automated
Every IT department faces the 'revolving door' problem of user lifecycle management. Accounts and permissions must be continuously created, assigned, modified, and revoked. This has to happen in response to organizational changes -- without delay. This process is...
Utilizing a Cloud-Based IAM Solution in Government
Utilizing a Cloud-Based IAM Solution in Government The proper security of your systems and resources is crucial, especially when you’re handling government or private citizens’ personally identifiable information (PII) and data. Data leaks are lurking and can have...
How to reduce the risks associated with onboarding new employees
We are all susceptible to the curse of “password fatigue”, or struggling to remember countless logins and passwords. It becomes incredibly difficult to keep track of them all, forcing many to make their passwords easy to remember, often at the expense of security....
Multifactor Authentication (MFA), what are the options?
Providing easy and secure access to enterprise applications is something that every organization aspires to do. Single Sign-On (SSO) can offer a significant improvement in efficiency because you can access all of your resources and applications with a single set of...
How HelloID Can Improve Your Organization’s Security
An Identity and Access Management (IAM) solution is critical to improving your security efforts and can help your organization realize additional benefits (e.g., eliminating wasted time, increasing efficiency, and cutting down on costs). Below is a brief look into how...
Why You Need to Ditch Manual Provisioning
As much as the road less traveled often builds character, who would actually prefer the long and winding path over a quick and painless shortcut? Whether you recognize it or not, we have all been given shortcuts to make our daily lives easier: You can head to the...
Your data sucks
I have worked with the user-related data of well over 100 organizations in my last 5 years as an Identity Management consultant. Without exception or reservation, it has all been garbage in one way or another (sometimes in multiple ways). It may be a bit of hyperbole...
Part 2: Mitigating the risk of internal breach
In part one of this blog series, we showed how access governance, in conjunction with automated provisioning and de-provisioning of user accounts are essential in preventing internal data breach on an organization's network. Today we are going to discuss how to take...
Part 1: Mitigating the risk of internal breach
Situation: Threats are commonly internal Companies spend considerable resources protecting against the threat of data breach – and rightly so. A data breach can result in large fines and, more importantly, a damaged reputation. While companies focus most of their...
Attestation & Reconciliation – what is it and why do you need it?
Identity and Access Management (IAM) is a framework of policies and high standard technologies built to ensure organizational users are granted the appropriate access to resources. Read more about What is Identity and Access Management? Many factors come in play to...
The Phased Approach to Implementation
Over the past 11 years I have, as a consultant and project manager, implemented and managed many IAM solutions. These projects have varied from very small to enterprise-level solutions. This experience has given me quite an insight into how businesses operate, how to...