Looking Back: 3 Years of Identity Management & Cybersecurity

Earlier this month Idenhaus celebrated its three year anniversary. Since our inception in 2014, the cybersecurity landscape has changed significantly. Let’s take a look at 3 important trends that have emerged in the past 3 years.

Mobile Devices Proliferate

The Bring Your Own Device era is in full swing and has blown apart the traditional network perimeter. Security issues abound as organizations struggle to adapt policies and systems to mitigate the risks presented by devices they don’t own running operating systems that out of date. Today, no consensus has been reached regarding the most appropriate and simplest method for securing end users’ devices.

“Cloud First” Strategy Reigns Supreme

Although “Cloud First” as a concept has been around for a few years, it’s become the rule rather than the exception in the past few years. The economics of the cloud combined with the ability to deliver centrally hosted applications to any device are driving Cloud adoption.

The Internet of Things is an Unavoidable Security Threat

Everything in your house will be connected to the internet soon. Google Home and Amazon’s Echo & Dot are the latest Internet of Things (IoT) devices for consumers and were big sellers during the 2016 holiday season. IoT presents numerous security and privacy challenges, since devices are often deployed in their default configuration by consumers making them easy targets for hackers. Today, the end user is still the weakest link in the security chain. Privacy is also at risk, as police have already tried to subpoena audio files from Amazon’s Echo as part of a murder investigation.     

Follow @Idenhaus on Twitter and subscribe to our blog.

Photo credit: Flickr


By going to work quickly to solve the most challenging cybersecurity and identity management problems, Idenhaus takes the pain out of securing corporate information and assets for companies that aspire to maximize their potential in this digital age. Click here to contact us

Share

Leave a Reply

Your email address will not be published. Required fields are marked *