data security and governance

3 Steps to Gaining Control and Governance over Permissions

For most organizations, the evolution of their environment is focused on addition. Such as adding new servers, applications, connections, cloud resources, and directory services. The same scenario applies to your organization. With each part of this growth comes an equally growing number of permission assignments. These permissions make up your current state of security. But we all know, once a permission assignment is made, it is usually never thought of again.  But now, among the…

multi factor authentication

4 Reasons Why MFA Should Be a Requirement for IT Tasks

In a world that has turned uncertain, the world of data security remains constant. The COVID-19 virus is wreaking havoc on the service industry, entertainment businesses, and the stock market. Still, many businesses have the flexibility to remain open despite closing their physical doors. As businesses remain open, attackers will continue to find ways to exploit them.…

0 percent trust security

Why Zero Trust Security Requires Group and Identity Management

The latest trend in security – Zero Trust Security – demands a “never trust, always verify” approach. At the heart of this approach is the requirement that the configuration of identity and associated assigned security is 100% correct. Without this in place, Zero Trust is protecting an insecure environment. If you’re new to Zero Trust,…

webSSO

The Productivity Gap in Single Sign-On – Accuracy In Directory is Key

In my last article, I introduced the merits of using Single Sign-On within your organization. In it, I discussed the possible security gaps that can multiply as you, in essence, extend your on-prem directory service to include multiple directories. And, while there are security benefits for using SSO – centralized policies and administrative work (which…