Identity Automation Blog

Businesses Need To Adopt A Zero-Trust Approach To Stay Secure While Working Remotely

*Disclaimer: This article originally appeared on Forbes.

With COVID-19 forcing organizations of all sizes to shift employees to remote work, some may be concerned their company’s cybersecurity measures are inadequate. Though COVID-19 is the most drastic recent example of necessitating working from home, it certainly won’t be the last.

Read More

Government and Cybersecurity: Conquering Secure Remote Access

COVID-19 has forced hundreds of thousands of government and public safety staff to rapidly shift from the traditional office setting to remote offices located in their homes. These employees have gone to work in the same building every day for years, often with a badge for secure building access, and essentially followed the same daily operations. But now, everything has changed.

Read More

How to Best Celebrate World Password Day: Implement Passwordless Authentication

Today is the first Thursday of May, which means it’s World Password Day. World Password Day is a timely opportunity to remind internet users to evaluate their individual password strengths and best practices. However, in reality, passwords are a significant vulnerability and even the strongest passwords can easily be stolen and compromised.

Read More

Four Keys to Proper Cyber-Hygiene on World Password Day 2020

*Disclaimer: This article originally appeared on ITProPortal.

World Password Day occurs each year on the first Thursday of May. This year, May 7th will mark the occasion. There’s no better time than the present for organizations to assess cyber hygiene best practices for keeping data and devices secure from cyber threats.

Read More

SB 820 & COVID-19: Why MFA Must Be Part of Cybersecurity for Schools

While there is no user group that is safe from data breaches, K-12 is particularly vulnerable right now. In North Dakota alone, the state network used by K-12 schools, state universities, and other public agencies experience 5.7 known cyberattacks every month. Data breaches are not uncommon, and districts are limited in the measures they can take due to budget constraints.

Read More

Breaking Down the Identity and Access Management Capability Maturity Model, Part One

Recently, we discussed the four key areas of comprehensive identity and access management (IAM) as well as the common misconception that IAM is a technology that’s confined to select areas. As we transition away from this perception to one of a robust and mature IAM system with a wide array of tenets, it’s critical to determine an action plan to improve your organization’s IAM capabilities.

Read More

SSO, Passwords, and MFA: Is the Future Passwordless?

Recently, Identity Automation CEO, James Litton was featured in a USA Today article that posed the question: Is Single Sign-On (SSO) the answer to our password-related struggles?

Read More

Capital One Data Breach Recap: Keep Your Organization Ahead of the Curve With IAM

March 23, 2019 seemed like any other Monday at Capital One headquarters. Little did employees and customers know that, over the weekend, a hacker had successfully breached Capital One’s security defenses. 

As a result, more than 140,000 Social Security Numbers, 1 million Canadian Social Insurance numbers, and over 80,000 pieces of banking and credit information were stolen, along with an undisclosed number of names, addresses, credit scores, and more. 

Read More

Multi-Factor Authentication and the Identity and Access Management Capability Maturity Model, Part Two

Chances are, you’ve encountered multi-factor authentication (MFA) at some point. Perhaps you entered your username and password to log into your bank’s online portal, and although they were correct, the system challenged you with a second form of authentication.

Read More

Federated Identity Management: Defining the Levels of the Federation Maturity Model, from Basic to Mesh

Recently, we discussed maturity models, and why we believe that federated identity management is the most logical first step in the Identity and Access Management (IAM) Maturity Model.

Read More

Subscribe Here!