Thanks for reading the Idenhaus biweekly news digest. Every two weeks, we curate a selection of insightful Access Management, IGA, Identity Management & Cybersecurity articles. We recently launched a new resources section with on-demand webinars, case studies, and educational videos.
As organizations mature in scale and complexity, so too does managing the complexity of user access and the corresponding risk governance issues. With this in mind, Role Based Access Control (RBAC) provides a framework to help manage user access in the context of a rapidly changing and more complex risk profile.
How well are healthcare organizations protecting patient information? via HelpNet Security
The balance between optimizing the user experience and protecting the data must be achieved in an effective cybersecurity strategy: HCOs need to make it easy for patients and partners to access records while ensuring adequate data protection.
Hackers Favor Weekdays for Attacks, Share Resources Often via ThreatPost
When researchers looked at the web-filtering volume from two Cyber Kill Chain phases, comparing weekdays and weekends, they discovered that pre-compromise activity is roughly three times more likely to occur during the work week.
Hackers often attack company networks using compromised login information. Experts say the solution is secure yet flexible identity-management tools and practices — but figuring out what is best isn’t easy.
92% of SMBs Struggle With Identity Challenges via Solutions Review
Recently, password manager LastPass unveiled their latest study: SMBs Guide to Modern Identity. Among their critical finds, 92% of small-to-medium-sized businesses (SMBs) deal with identity challenges in their environments. 47% cite ease of use as their biggest challenge.
Enterprises are generally aware of the problem and want to fix it, but they rarely know where to start or what to do. A big pain point is that they don’t have the level of visibility required to understand what actions identities are authorized to perform on critical resources across multiple, complex and vastly different cloud operating models. As such, cloud migrations are an ideal time to prioritize identity privilege management.
After Car2Go eased its background checks, 75 of its vehicles were stolen in one day. The mass theft in Chicago illustrates a persistent challenge for car-sharing companies looking to draw in members with access to expensive makes and models.
Automation is the key to making the onboarding process—a critical business process—work for your organization. But how do you decide what parts of the process are worth the effort to automate?
Check out our previous digest of insightful Identity Governance and access management articles here: Idenhaus Biweekly: RBAC, Healthcare Cybersecurity, Identity Management
By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us