cybersecurity and entitlements

Entitlement Management Against Cyber Attacks: The 6 Times You Might be at Risk!

The demands of every organization are unique. What’s not unique are the pressures on IT to make sure people have the right access to secure resources and systems. Your unstructured data is a primary target in nearly all worse case scenarios. Protecting such data gets harder if you don’t understand where it exists, who has access…

active directory group management

Active Directory Groups Management in Enterprise Hybrid Cloud

What is a Enterprise Hybrid Cloud? Enterprise Hybrid Cloud can have everything in cloud among the services, like Okta, Sail Point, ServiceNow, Active Directory & Azure AD taking to each other. For example, a Helpdesk Request can generate from Service Now for a new user onboarding that requires provisioning an account in Okta for Single-Sign…

data security and governance

3 Steps to Gaining Control and Governance over Permissions

For most organizations, the evolution of their environment is focused on addition. Such as adding new servers, applications, connections, cloud resources, and directory services. The same scenario applies to your organization. With each part of this growth comes an equally growing number of permission assignments. These permissions make up your current state of security. But we all know, once a permission assignment is made, it is usually never thought of again.  But now, among the…

remote teams

How To Work Effectively With A Remote Team, The Right Way

The sudden change in global affairs has likely created new challenges for you and your team, making it hard to keep up with what matters most to your business — your customers and employees.   With many people forced into shelter-in-place by the current situation, the question of how to survive this pandemic has suddenly morphed to how to work effectively with a remote…

multi factor authentication

4 Reasons Why MFA Should Be a Requirement for IT Tasks

In a world that has turned uncertain, the world of data security remains constant. The COVID-19 virus is wreaking havoc on the service industry, entertainment businesses, and the stock market. Still, many businesses have the flexibility to remain open despite closing their physical doors. As businesses remain open, attackers will continue to find ways to exploit them.…

Anonymous Hacker

5 Reasons Why Cyberattackers Love AD Groups

Current research regarding cyberattacks shows that hackers target Groups in Active Directory, Azure AD and Office 365. Why are groups so attacker-friendly? The CrowdStrike 2019 Global Threat Report discusses how long it takes for attackers that have compromised a single endpoint to move laterally within your network. The Russians have the best average time at a little…

Self service password reset

The Value of Self-Service Portal in a Shadow IT World

When “Shadow IT” no longer lives in the shadows, it’s time to embrace the technical value! Users can bring this value by utilizing the IT-sanctioned self-service tools. The advent of the cloud has invigorated the notion that users can do a lot of things themselves without the help of IT. Originally referred to as “Shadow…

Active Directory Group Management

Is Just In Time Too Much Time?

There has been a lot of talk over the past few years on Just In Time provisioning. That is, using an SSO (Single Sign On) platform to create nearly real-time accounts in web-based applications the first time they are used. This increases productivity and reduces the amount of work required for IT workers to create…

group access identity

The Role of Roles in Delegating Access

The delegation of directory administration to those outside of IT is a concept whose time has come. But it can’t be done hap-hazardly; IT needs to define what is being delegated and to whom. We’re at a point in the evolution of our industry that two truths have come to fruition: IT no longer has…

azure groupID

Azure AD Gets on the Group Expiration Bandwagon

Azure AD Gets on the Group Expiration Bandwagon I recently wrote about the need for group expiration as part of a comprehensive lifecycle approach to group management. It’s a necessary step, given the life of group objects in any of the directories you manage won’t last forever. The only exceptions, generally, lie around built-in administrative-type…