
The Best Practices for User Provisioning and De-provisioning
User provisioning is a standard component of onboarding and involves creating user accounts for a newly hired employee. It entails access to IT resources (including the directory) and to systems, networks, and applications that are vital to the employee’s performance of their job. The usual IT resources provided to a new employee include the […]

How Can You Optimize Passwordless Authentication?
Have you gone passwordless yet? Making the switch may be the best security move you can make today, because passwords are becoming even less secure, especially when you consider users’ tendency to have poor password security habits. For example, 52 percent of users reuse the same password for multiple accounts, and 59 percent of American […]

Top 7 Cybersecurity Budget Considerations for Small Businesses
Prevention is better than cure—or, to be more specific in the context of cybersecurity, damage repair. Better means less costly, and for small business, it almost always means survival. But the fact is that many small businesses need to take a good long look at where their cybersecurity funds are going, how much is going […]

ZeroTrust and work from Mars, By Chris Werpy, COO, PlanetOne
As our Planet made the shift to work from wherever, remote access exploded in numbers and speed, with capacity taking the lead. Looking ahead, it’s time to determine how to not only keep the lights on, but to drive increased productivity without compromising security. Is the environment we work in today designed for the future, […]

Make MFA Adoption Easier for Everyone in Your Organization
Multifactor authentication (MFA) is a must for enterprises to ensure data security in the face of both new attacks and persistent older ones that are constantly being fine-tuned by cybercriminals. It offers multiple layers of security to your login processes through multiple means of authentication. However, while MFA is intended to thwart cybercriminals attempting to […]

Why Companies do not want to Go Passwordless
Addressing the Top 4 Reasons for Hesitation Studies have shown an increased appetite among consumers for multi-factor authentication, including biometrics as a replacement for the username and password login method, and evidence is clear that credential-based login poses the number one threat for security breaches. Experts and tech writers have been saying that we need to “break […]

20 Identity and Access Management (IAM) Terms You Need to Know
Forget buzzwords and buzz phrases. These terms are keepers, and knowing them can go a long way to help you navigate identity and access management for your organization’s systems and networks. Access management The processes and technologies used to control and monitor network access. Access management features, such as authentication, authorization, trust and security auditing, […]

Why Access control should be a Top Security Priority?
At its most basic, access control is a means of ensuring that users who are logged in to your system are who they say they are, and that they have been granted appropriate access to your organization’s data. At a highly technical level, Daniel Crowley, head of research for IBM’s X-Force Red, describes access control […]

Should Have Authentication and Authorization to be Cyber secure
How Is Authentication Different from Authorization, and Why Should You Have Both? Authentication is concerned with identity, while authorization is concerned with action. Authentication involves validating the identity of a registered user attempting to gain access to data resources such as an application, an API, or microservices. Authorization involves specifying what actions a registered user […]

Cyber Resiliency for Small Businesses: Techniques and Tips
Cyber Resiliency for Small Businesses: Techniques and Tips In the context of cybersecurity, resiliency is all about how organizations bounce back from an incident that involves the interconnection of multiple domains such as cybersecurity, business continuity, and organizational operations. You need to be cyber resilient to adapt and continue to deliver services or provide products […]

How Tech has Evolved. And How it Really Hasn’t.
It’s Time to Fix What’s Been Broken From the Get-Go As humans, we’ve evolved a fair amount. But Technology is another animal altogether. Taking a look at our infographic, the technological shifts we’ve witnessed since the 1950s are nothing short of mind-blowing. From pen and paper and a phone to today’s superpowered mobile devices, AI, […]

Beware of Tycoon – the Ransomware Targeting Windows and Linux Systems
Beware of Tycoon—the Ransomware Targeting Windows and Linux Systems. Windows and Linux systems are in the cyber-crosshairs of a recently uncovered ransomware, in what appears to be a targeted campaign. Tycoon is a multi-platform Java ransomware that is deployed in the form of a Trojanized Java Runtime Environment (JRE) and leverages an obscure Java image […]