British Airways Cyberattack Emphasizes the Need to Get Security Basics Right, Part 1

On September 7, 2018, British Airways disclosed that a data breach had impacted customer information taken from approximately 380,000 booking transactions conducted between August 21 and September 5, 2018.

Although the attack wasn’t elaborate, it was effective. A cyber attacker installed malware on British Airways’ website using a known security vulnerability to introduce malicious code that altered the behavior of the booking website—without penetrating the network or servers in a way that could trigger additional alerts.

Read More

Healthcare M&A: How IAM Helps Tackle Common Integration & Consolidation Challenges, Part 2

More and more, healthcare as providers are merging together or acquiring other hospitals to to increase their footprint, provide higher levels of patient care, and enable strategic synergies.

Modern identity and access management (IAM) solutions are a crucial, but often overlooked facilitator of IT integration. Having the right IAM solution in place not only reduces time, costs, and integration conflicts, but also ensures a smoother transition for both clinicians and patients.

Read More

Meeting Compliance Requirements - What Your Organization Should Know

Let’s be real. Attackers are growing more and more emboldened by the day. As their tools become so simple that even “script kiddies” can use them to wreak havoc on unsuspecting targets, governing bodies are putting added emphasis on tighter regulatory compliance.

Read More

Retail Data Breach Update: Top 3 Cyber Threats To Retailers and how IAM Can Help

While the volume of cyberattacks is on the rise across the board—attacks are up 100 percent since 2015—retail is particularly at risk. And the numbers back that up.

One study found that retailers respond to cyberattacks on average twice a week, with an astonishing 16 percent experiencing attempted attacks daily.

Read More

Assigning Authentication Risk Levels, the Problem with the Traditional Approach

The employees in your organization are all different. There are people in marketing and finance and HR. There are people who always work from the office, those who always work from home, and those always on the road. Some employees need lots of access to sensitive data and systems to do their job, while others only need basic access to standard applications.

Read More

Benefits of Single Sign-On Solutions

Many of our customers implement our Identity and Access Management (IAM) platform for its identity lifecycle management capabilities. And with good reason—automating these tasks means IT no longer has to waste valuable time and resources creating and managing accounts or provisioning and deprovisioning systems and target applications.

Read More

How to Address Shadow IT in Higher Ed

Does your university have a shadow IT problem? The answer is most likely yes. Higher education institutions across the country are struggling with shadow IT challenges resulting from devices, services, and software residing outside of IT’s control and/or ownership.

Read More

The 6 Business Systems You Should Be Protecting with Privileged Access Management, Part 2

Your organization likely realizes the unfettered access that traditional IT privileged accounts provide and has taken proactive steps to lock down access to these accounts. But what about critical business systems that offer the ability to cause reputational damage or that provide access to monetizable data, such as protected health information (PHI), credit card numbers, and social security numbers?

Read More

Addressing Cyber Security Threats in Higher Education With an Integrated Approach

With the explosion of the number of cyberthreats, higher education institutions are struggling to secure their IT infrastructures in the face of limited budgets and staff. Add to this the decentralized nature of these institutions, and you have a recipe for cyber disaster.

Read More

The 6 Business Systems You Should Be Protecting with Privileged Access Management, Part 1

Traditionally, privileged accounts are IT-based and have special active directory (AD) attributes. IT administrators use them to log into servers, switches, routers, and applications and perform tasks without restriction.

Legacy security systems focus on protecting these AD privileged accounts, and with good reason: Once obtained by hackers, the accounts can be used to access the most sensitive data, lock out legitimate users, and create ghost accounts and back doors that are not easily seen.

Read More

Subscribe Here!