Data Quality – Why You Can’t Ignore It Any Longer

  by Leah Livingston Managing your organization’s data can seem like a daunting task, especially after years of piecemeal processes, applications and add-ons have compounded upon one another. Once in this type of situation, getting your “house in order” can seem overwhelming and nearly impossible. However, just like the foundation of your home, ignoring that

Read More »

Healthcare and Cybersecurity, May They Stay Hand in Hand

While May isn’t a magical “primetime” for cybersecurity in healthcare, we at Idenhaus think cybersecurity should be highlighted every month. How prepared is your clinic or organization for a cybersecurity issue, whether that’s a case of phishing, malware, a data breech, or an insider threat? Idenhaus is here to help you prepare with some articles

Read More »

Building A New Foundation for Decentralized Identity

Written by Ron Bowron For those of us from the Apple IIe and the Windows 3.1 Generation, we all remember the days of “Granted until Denied” permissions and the simple Access Control List. Imagine having full access to the computer and all the system’s resources just by logging in?  We were gods in our own

Read More »

How HR Processes Can Work in Tandem with Identity Management

How HR Processes Can Work in Tandem with Identity Management     One of the most staggering statistics that you’ll find across third-party research, is that more than half of identity management projects fail the first time. You are more likely to toss a coin in the air and call heads and get it right

Read More »

Does Your Organization Need An IAM Strategy?

  Do You Need An IAM Strategy? There is a well-known management book titled “What got you here, won’t get you there”. The basic premise is that future success begins with a commitment to continuous improvement, especially for those people who have already achieved an initial level of success. The central imperative is to challenge

Read More »
Scroll to Top