Identity Automation Blog

Recent Posts by Kathleen Garska

 
Kathleen Garska, Identity Automation's Director of Marketing, is an experienced digital marketer and marketing communications specialist within the B2B and technology spaces. With a decade of professional writing and editing experience, Kathleen heads Identity Automation's marketing department, managing the strategic direction of the company's blog, website, content resources, digital marketing and demand generation efforts. Beyond Marketing, Kathleen is a dedicated (see: obsessed) dog mom to two rotten terriers, and she loves art, travel, cooking, yoga, and cycling.

University Security: Implications of BYOD Policies - Part 2

Bring-your-own-device (BYOD) policies are now a necessity for universities and colleges across the country. In Part 1 of this series, we covered the positives and negatives of BYOD, as well as the security implications of such policies. In this post, we’ll go over how to easily implement secure BYOD using a modern identity and access management (IAM) platform.

Read More

University Security: Implications of BYOD Policies - Part 1

Bring your own device, or BYOD, is a fast-growing trend on higher-education campuses across the country. In fact, at least 42 percent of U.S. colleges and universities have implemented a BYOD strategy. Meanwhile, bandwidth on campuses has nearly tripled since 2012, with more than 70 percent of schools offering at least 1 GB, in part because of the need to keep up with BYOD demand.

Read More

Why Are Flexible Authentication Policies Important in Today's Environment?

Gone are the days of your employees working a standard nine to five from within company walls. Today, employees often work remotely—from different devices and at all hours of the day.

Read More

Why You Need to Immediately Cut Data Access When Employees Leave



When your company parts ways with employees, are you able to immediately terminate all access to corporate data? If not, you’re opening the organization up to a very real danger.

Read More

Privileged Access Management vs. Privileged User Management

The majority of major data breaches in recent years have resulted from hackers gaining access to unmanaged and unprotected privileged accounts and credentials.

Privileged and services accounts are a significant risk because of the access they provide the user with access to an organization’s systems and data. These accounts can be used to access the most sensitive data, lock out legitimate users, and create ghost accounts and backdoors that are not easily seen.

Read More

Why SMS 2-Step Verification Won’t Keep You Safe

If you’re active with any online service, then you have probably gone through the process of SMS two-step verification, in which a company or app texts a one-time code to your phone as a way to verify you are who you say you are in order to access the service or reset a password. But have you ever stopped to consider how secure this method truly is?

Read More

CEOs: Get Everyone on the Same IAM Page


Properly managing cybersecurity risks demands that corporate leadership understands the full potential impact on your business—including reputational and legal risks. This starts with a dialogue about the security risks at your organization—how serious they are, how critical prevention and risk mitigation are, and how sophisticated attackers have become at stealing user credentials and breaching supposedly protected systems.

Read More

4 Ways Organizations Can Define Their Account Username Convention

Developing a company-wide account username convention as part of a company’s enterprise password management strategy is an important and challenging task. For organizations managing more than one set of credentials for their various systems and applications, a best practice is to consolidate all credentials into a single, enterprise-wide account username convention.

Read More

What Is Risk-Based Authentication?

As businesses onboard more mobile and remote employees, partners, contractors, and other external users, the volume of people needing access to critical systems and data grows exponentially. And while this increased connectivity provides tremendous operational and productivity benefits, it also creates new attack vectors for intruders and cybercriminals.

Read More

We’ve launched the new Identity Automation website

Identity Automation has launched our new, fully-redesigned website and we are excited to share it with you! The new site offers streamlined navigation and cleaner design that deliver direct access to the information you need.

Read More

Subscribe Here!