Is your Business Audit-Ready? Four Key Data Questions You Must Answer

Is your Business Audit-Ready? Four Key Data Questions You Must Answer

Audit – a word that is certain to strike fear and trepidation into almost any IT professional. Yet in an environment where hardly a week goes by that we don’t hear about one business or another being hacked, audits are essential. Losing control of valuable customer data can leave a business open to lawsuits and fines, and the damage to done to your reputation can be even more costly. Depending on your business, your audit might be necessary to comply with [...]

Incorrect Passwords

How to Create Strong, Memorable Passwords

Every day we use passwords to access our email, look at our bank accounts, make payments, log in to social media and much more. Most users have passwords for at least ten sites, and possibly many more. In most cases, these passwords are all that stand between our personal information and criminals that want to access that data and take advantage of it for their own profit. Imagine if someone could access your bank account, your social media, or your [...]

5 Trends Driving Identity and Access Management

Five Trends That Are Driving The Need For Identity and Access Management

Fifteen years ago, Identity and Access Management (IAM) was relatively simple; employees would work on the premises using a desktop PC that had been set up and configured by the IT department. Only those who had a login could gain access, and if you weren’t on the premises it was a lot harder to gain access to valuable corporate resources. Fast-forward to today and security breaches of corporate IT networks are rarely out of the news. So far in 2015 [...]