Don't be lazy: Never trust, always verify.

Everything we can want is at our fingertips and ripe for the picking. But, should you really take all that you can?

After-all some of it may just me downright rotten. Yes I'm still speaking about technology.

Border walls don't keep anyone out.

That next gen firewall your provider sold you at 50% margin is useless to a degree. Let's remember a firewall is a detection device for the perimeter. As long as there are tunnels and your firewall is letting something through (like Facebook or Google) then anything can get in.

Data is the new border and it can be housed anywhere.

 How many devices do you interact with on a day to day basis?

  1. Mobile phone
  2. Desktop/Laptop
  3. Tablet
  4. Smart something or the other tracking you
  5. VoIP handset
  6. Printer/Copier

Now chew on this. How many employees in your office, each with at least half of the above plus personal devices all connected to the work network?

The problem.

That pit in your stomach, is the realization your business is and has always been...

Continue Reading...

Identity and access management 101.

Whether it be cloud, mobile, or on-premises, every technology you use stores confidential data that are accessed by your employees. So how do you guarantee the safety of said data from cyberthreats like identity theft, phishing attacks, and more? Identity and access management (IAM) is the answer, and here’s why.

What is IAM?

Identity and access management is a system that secures, stores, and manages user identities and access privileges. It ensures that users are who they say they are and will grant access to applications and resources only if they have permission to use them. System administrators can make it so that employees can only access apps and data they need for work.

Other solutions that go into identity and access management include single sign-on (SSO) and multifactor authentication (MFA). The former allows users to securely log in to multiple applications that they are authorized to access. Meanwhile, MFA sets an additional method of user verification other than...

Continue Reading...

75% Complete

Two Step

Enter your name and email address below to receive updates from us.