Imagine this: you wake up to a notification – your company has suffered a data breach. Fear sets in as you think about what this...
Top tips: Camfecting—Protect yourself from prying eyes
Top tips is a weekly column where we highlight what’s trending in the tech world today and list ways to explore these trends. This week,...
Has your personal data been breached on the dark web?
The dark web can feel like a mysterious underworld, a hidden corner of the internet where there are no rules. It’s a place where stolen...
How to secure PHI with an identity governance solution
Cyberattacks pose a growing threat across all industries, but healthcare is especially vulnerable. In 2023, hacking incidents in the healthcare sector accounted for 79.7% of...
Combating phishing attacks with passwordless FIDO2 authentication
Attackers predominantly use phishing attacks to steal and misuse user identities. A global Statista study on employee-reported malicious emails revealed that in the first quarter of...
Identity Management Day: Protecting your digital footprint
Identity Management Day occurs on the second Tuesday of April, April 9 this year. It was established by the Identity Defined Security Alliance in 2021...
Uncovering identity threats: Lessons learned from a real-life data breach
Every IT admin, regardless of the company size or employee count, shares a common fear: data breaches. The horror of discovering their organization’s data exposed...
USB review, Part 2: How to manage USB devices
In this two-part series, the first blog demonstrates how USB devices can be conduits of threats. Read that blog to learn more about USB security threats. In this...
Backup basics: Ensuring data security in an uncertain world
In today’s digital age, where data is the lifeblood of businesses and individuals alike, the importance of backup and data protection cannot be overstated. Whether...