We all try to do as much as we can on our own, but sometimes, help is needed to get the job done the right way, in the right amount of time. This is why a consultant can be a valuable asset for your identity management enterprise efforts and other initiatives.
Topics: Identity Management
When you think of companies being hacked, which are some of the first that come to mind that are most vulnerable to hacker attacks?
We may be quick to point the finger at big corporations, but it’s not just them that are being targeted--small companies are just as viable to hackers, or “the bad guys.”
This should come as no surprise.
Last year’s Duke University/CFO Magazine Global Business Outlook Survey, indicated that over 80% of U.S. companies’ systems “have been successfully hacked in an attempt to steal, change or make public important data.”
Most things that took computer access years ago are now able to be done with a few finger taps of a smartphone: Checking our account balance, making a car payment, and even monitoring blood sugar, to name a few.
But in the last few years, many have integrated smart homes into their everyday lives: Climate control; monitoring door and window locks; video surveillance… the future is now, many say, with having this connected access at the tap of a finger.
The stuff of nightmares is no longer the boogeyman or Bloody Mary--it’s mutated into hackers, thieves and crooks. An article from theguardian shows how a known hack dated back to 2014 is still very much in motion.
All they need is your phone number, and nothing else.
Regardless of carrier, with no remedy besides turning your phone off, this hack uses Signaling System No. 7 (SS7), a network interchange service, which “acts as a broker between mobile phone networks.”
The healthcare industry has been riddled with security and HIPAA breaches, especially since electronic medical records have become a major contender and requirement in more and more doctor’s offices.
With this increased need for security has come a demand for better identity management.
As noted by the Electronic Health Reporter, Vice President of healthcare for LexisNexis Harry Jordan has said the most important question is not “Who are you?” but “What do we need to know about you?”
Topics: Identity Management
I sometimes think of the discipline of IAM Program Governance as PPnT - “people, process, and no technology.”
It is the least technical part of the IAM leader’s job. Really IAM Governance includes a few disciplines:
Operating Model (PBR)
At Identropy, we’ve been talking about “Plan, Build, Run” (PBR) for a long time. I have been thrilled lately to see how many of our clients have embraced PBR in their IT organizations.
PBR is a wonderful operating model and fits really cleanly as a framework for IAM governance and organization.
Topics: IAM Program
The Internet has spawned a huge increase in connected devices that has permanently changed the way we interact--this is especially true in the healthcare sector. With each connection comes an added risk for breaches of security and important data.
One such example is a healthcare association that has worked alongside Identropy to improve their IT footprint and enterprise architecture goals.
Topics: IAM solution
Many events, current and otherwise, have changed the way we look at security.
From the recent Panama Papers scandal to companies investing considerable assets into security (Microsoft being one, who’s invested $1 billion from 2014-2015), it’s obvious there’s a need to integrate strategies throughout an entire enterprise, and not just patches.
If you’ve been on the Internet at all in the past few years, you’ve probably seen some hum or buzz about the “cloud” or “cloud-based” programs. It basically means hosting data through the Internet and not through physical hardware.
This bypass of hardware results in more convenient (and unprecedented) enterprise solutions that have changed the way we do business.
When working with passwords, many times people in the industry use the terms encryption, passwords, hashing and encoding interchangeably--but in reality, they are quite different. There's a time and a place to use each.