Recent Posts by Kathleen Garska

 
Kathleen Garska is an experienced digital marketer and writer within the B2B and technology spaces. As Identity Automation’s Marketing Manager, she oversees the company’s digital, social, event, and blogging efforts. Beyond Marketing, her interests include art, design, travel, and cooking.

Two-Factor Authentication (2FA) Explained: Social Login

Companies and end-users alike are constantly looking for authentication methods that lower barriers to entry and improve user experience without compromising security.

Read More

Healthcare Cybersecurity and the Human Factor: Using Risk-Based Authentication that Considers Behavioral Factors

In the healthcare industry, a lot of energy goes into driving practitioner efficiency and making patient data easier for clinicians to access. But is enough focus being put on security and protecting patient data?

News headlines indicate the answer is a resounding no. There have been a slew of notable healthcare breaches in recent years.

Read More

Two-Factor Authentication (2FA) Explained: Smart Cards

Smart cards are cards or cryptographic USB tokens that are used for a number of authentication purposes, including physical access (buildings, rooms), computer and network access, and some secure remote access solutions (virtual private networks (VPN), portals).

Read More

Two-Factor Authentication (2FA) Explained: One Time Password Hard Tokens

One time passwords (OTPs) are a popular choice for organizations looking to increase their security posture with two-factor authentication. As a refresher, OTPs are unique passwords that are only valid for a single login session and a defined period of time.

Read More

Two-Factor Authentication (2FA) Explained: One Time Password Soft Tokens

In today’s dynamic business environment, organizations are putting more and more pressure on users to increase productivity without sacrificing security. However, a company’s infrastructure needs to be nimble enough to meet these needs without negatively affecting user experience.

Read More

Assigning Authentication Risk Levels, the Problem with the Traditional Approach

The employees in your organization are all different. There are people in marketing and finance and HR. There are people who always work from the office, those who always work from home, and those always on the road. Some employees need lots of access to sensitive data and systems to do their job, while others only need basic access to standard applications.

Read More

The 6 Business Systems You Should Be Protecting with Privileged Access Management, Part 2

Your organization likely realizes the unfettered access that traditional IT privileged accounts provide and has taken proactive steps to lock down access to these accounts. But what about critical business systems that offer the ability to cause reputational damage or that provide access to monetizable data, such as protected health information (PHI), credit card numbers, and social security numbers?

Read More

The 6 Business Systems You Should Be Protecting with Privileged Access Management, Part 1

Traditionally, privileged accounts are IT-based and have special active directory (AD) attributes. IT administrators use them to log into servers, switches, routers, and applications and perform tasks without restriction.

Legacy security systems focus on protecting these AD privileged accounts, and with good reason: Once obtained by hackers, the accounts can be used to access the most sensitive data, lock out legitimate users, and create ghost accounts and back doors that are not easily seen.

Read More

Cloud Computing for Schools: How IAM Systems Can Improve Migration

If you are thinking of moving to the cloud or have already started that transition, you’re in good company. An impressive 80 percent of school districts are using cloud-based software. It’s easy to see why.

The cloud offers many benefits for students, educators, and administrators. Students are able to learn technology skills, collaborate with other students, hold group discussions online, and get valuable information from outside experts.

Read More

Privileged Account Management is More Than Just Protecting IT Admin Accounts

There have been a slew of major data breaches in recent years. The number of records exposed in data breaches last year alone reached 174.4 million—close to five times the 36.6 million records exposed in 2016, according to the Identity Theft Resource Center.

Read More

Subscribe Here!