SSH Keys Management - Header Image

A better way to manage SSH Keys

For IT administrators, DevOps leads and developers SSH Keys are a way of life. These little gibberish looking files, placed in esoteric .ssh folders inside your laptop or cloud server is the plumbing that makes all the applications and scripts work together. However, SSH key management is a severe pain for many organizations. A little exercise for you: "Are you affected?" How about a little exercise? Send a quick email to your IT lead/DevOps lead and ask them – how often [...]

Incorrect Passwords

How to Create Strong, Memorable Passwords

Every day we use passwords to access our email, look at our bank accounts, make payments, log in to social media and much more. Most users have passwords for at least ten sites, and possibly many more. In most cases, these passwords are all that stand between our personal information and criminals that want to access that data and take advantage of it for their own profit. Imagine if someone could access your bank account, your social media, or your [...]

Halloween Zombie Eyes

How Halloween inspired me on IT Infrastructure Access Control

Last year while giving candy to some very cute children in my neighborhood I was suddenly reminded of server access security! Bear with me for a bit as I take you on a journey through my random security oriented thoughts. Trick or Treat and Halloween Costumes My family and I usually give candy (the good kind mind you, no tootsie rolls) every year to lots of young children who visit our house in a residential neighborhood here in the Bay Area. [...]

The Agony of Provisioning Users on Cloud-Based Services

The Agony of Provisioning Users on Cloud-Based Services

The Agony of Provisioning Users on Cloud-Based Services In this article, we are going to take a look at the frustrations that businesses may face when provisioning users to cloud-based applications that they use. We will examine the most common difficulties, and how Onion ID can help you to overcome them. Dashboards are often confusing Millions of business users and Internet users experience frustration with online dashboards on a daily basis. Dashboards are often confusing, add to that the hassle of maintaining [...]

5 Trends Driving Identity and Access Management

Five Trends That Are Driving The Need For Identity and Access Management

Fifteen years ago, Identity and Access Management (IAM) was relatively simple; employees would work on the premises using a desktop PC that had been set up and configured by the IT department. Only those who had a login could gain access, and if you weren’t on the premises it was a lot harder to gain access to valuable corporate resources. Fast-forward to today and security breaches of corporate IT networks are rarely out of the news. So far in 2015 [...]

Why Anybody Can Steal Your Passwords

You juggle dozens of user names and passwords these days, especially if your business uses multiple cloud services. It's nearly impossible to come up with new passwords, change them regularly, and resist the temptation to use the same password for everything — or write it all down on paper. Data breaches impact companies large and small on a regular basis, and anyone can steal your passwords; it's not all that hard to do. When Malware Ruins Your Day Malware comes in [...]

How Can Businesses Protect Their Teams Data, Passwords And Identities

How Can Businesses Protect Their Teams Data, Passwords And Identities

The job market is changing rapidly and with it, the issue of identity and access management becomes a more and more complex problem for small business. Contractor jobs are the new norm in America, which means employees are coming and going at an ever increasing rate. Finding ways to keep business assets safe, protect devops teams from hanging cloud accounts, and discover new strategies for password management are now top priorities. Both companies and employees alike are seeing the benefit [...]