Identity Automation Blog

8 Steps to Limit the Security Risk of Contingent Workers

*Disclaimer: This article originally appeared in the EDUCAUSE, The Inside Line, blog series. 

In higher education as in corporate America, we're witnessing a shift in employment strategies toward increased hiring of contingent workers—employees, either full-time or part-time, hired for one year or less, with a specific end date. A January 2014 report from the House Committee on Education and the Workforce called "The Just-In-Time Professor" states that 50% of university workers are now adjunct or nontenured faculty, a substantial increase from only 20% in 1970.

Read More

James Litton Talks IAM on Texas Business Radio

Earlier this year, James Litton, our CEO, appeared on Texas Business Radio, the syndicated radio show that features leading businesses, people, and events from the Texas business world.

Read More

WEBINAR: A Trojan Horse of a Different Color: The Inherent Security Risk of Today’s Contingent Workforce

From seasonal employees to specialized contract workers, employment of contingent workers has dramatically increased in recent years. With 46% of businesses adding contingent workers in 2015, this workforce has proven to be resourceful, necessary, and here to stay.  While there are clear benefits to this type of employment, there are also major security risks if the access of these employees is not properly managed.

Read More

Major Breaches in Healthcare and Government Highlight the Need for Increased Investment in Security Training

The breaches of Hollywood Presbyterian Medical Center and the United States Office of Personnel Management (OPM) have been hot topics in the last month. Hollywood Presbyterian because it’s so fresh in our minds and the OPM because of the fallout resulting from it, including House Oversight Committee hearings and the (forced) resignation of its CIO.

Read More

The Risks of Contingent Workers - Did You Know?

Contingent workers are here to stay. In fact, in a recent report, CareerBuilder claimed that 2015 was the Year of the Temporary Employee, with 46% of businesses adding temporary workers, up from 42% in 2014. That number is expected to rise even more this year in what seems to be a continuous upward trend.

Read More

Cybersecurity & Contingent Workers - The Laughing Matter


I stand in front of more than 70 IT security professionals giving a presentation on security gaps associated with managing the access of
users who are not traditional employees. As is the norm, I pepper the presentation with some light attempts at humor to keep people engaged. Each quirky joke I share elicits the desired chuckle or murmur of amusement from the crowd.

Read More

9 Tips to Managing the Identities and Access of Contingent Users


The full-time salaried position is no longer the dominant worker classification that it was in the 1990s or even 2000s. More and more companies, focused on cutting costs, are employing contingent workers to avoid paying taxes and healthcare benefits on those workers. And more and more workers, led by millennials, are seeking contingent-based employment, desiring the flexibility and freedom that comes with those positions. This new economy we live in, defined by technology, sharing and innovation, is changing how we work.

Read More

The Password is Dead and Other 2016 Security Predictions

You could say 2015 was a house of horrors when it came to security breaches -- from high profile corporate hacks, stolen identities of 4 million federal employees, to a database breach exposing the names, genders, and birthdays of more than 200,000 kids.

Read More

Rise of the Rogue Employees

Yes, this post’s title is a little dramatic. Chalk it up to my excitement for next month’s release of the latest Star Wars installment, Star Wars Episode VII: The Force Awakens. Revenge of the Rogues seemed way too dramatic and not at all accurate (little bit of trivia for you, Revenge of the Jedi was the original planned name for Star Wars Episode VI) and The Rogues Strikes Back is probably even worse. 

Read More

IoT Affects the Enterprise Too

The Internet of Things (IoT) has become a very popular topic with the media and bloggers over the past few years. When it’s discussed, it’s typically in association with consumer devices, an aspect I never gave much thought to until last week when I was discussing the 2013 Target breach, and this post from Brian Krebs in particular, with a colleague.

Read More

Subscribe Here!