Identity & Access Management

How to Prevent External Access to Key Files

How to Prevent External Access to Key Files

Uber, arguably the largest ride-sharing service worldwide, has suffered its fair share of data breaches. A few years ago, the company experienced a leak that exposed over 50 million clients' personal information and data for over 7 million drivers. However, Uber's...

read more
Security Access Control Models for Schools

Security Access Control Models for Schools

This blog will cover multiple aspects of building an access control model based on Role Based Access Control (RBAC) and Attribute Based Access Control (ABAC). This includes steps needed to role mine and analyze access permissions across multiple systems, review what...

read more

4 Ways an IAM Solution Can Benefit Healthcare Organizations

It’s no secret that healthcare organizations must adhere to some of the most rigorous data protection regulations out there. The Health Insurance Portability and Accountability Act (HIPAA) puts in place strict rules that healthcare companies must follow to ensure the...

read more

Provisioning: Manual vs. Automated

Every IT department faces the 'revolving door' problem of user lifecycle management. Accounts and permissions must be continuously created, assigned, modified, and revoked. This has to happen in response to organizational changes -- without delay.  This process is...

read more

Utilizing a Cloud-Based IAM Solution in Government

Utilizing a Cloud-Based IAM Solution in Government The proper security of your systems and resources is crucial, especially when you’re handling government or private citizens’ personally identifiable information (PII) and data. Data leaks are lurking and can have...

read more

Multifactor Authentication (MFA), what are the options?

Providing easy and secure access to enterprise applications is something that every organization aspires to do. Single Sign-On (SSO) can offer a significant improvement in efficiency because you can access all of your resources and applications with a single set of...

read more

How HelloID Can Improve Your Organization’s Security

An Identity and Access Management (IAM) solution is critical to improving your security efforts and can help your organization realize additional benefits (e.g., eliminating wasted time, increasing efficiency, and cutting down on costs). Below is a brief look into how...

read more

Your data sucks

I have worked with the user-related data of well over 100 organizations in my last 5 years as an Identity Management consultant. Without exception or reservation, it has all been garbage in one way or another (sometimes in multiple ways). It may be a bit of hyperbole...

read more

Part 2: Mitigating the risk of internal breach

In part one of this blog series, we showed how access governance, in conjunction with automated provisioning and de-provisioning of user accounts are essential in preventing internal data breach on an organization's network. Today we are going to discuss how to take...

read more

Part 1: Mitigating the risk of internal breach

Situation: Threats are commonly internal Companies spend considerable resources protecting against the threat of data breach – and rightly so. A data breach can result in large fines and, more importantly, a damaged reputation. While companies focus most of their...

read more