What Is Spear Phishing?

Spear phishing is a form of cyber attack targeted at a particular person or small set of individuals. In these scams, bad actors research their chosen targets and attempt to convince them to surrender sensitive data or financial information. Spear phishing attacks may also aim to infect user devices with malware, allowing attackers to steal the…

What Is Data Theft?

Data theft is the act of stealing information stored on corporate databases, devices, and servers. This form of corporate theft is a significant risk for businesses of all sizes and can originate both inside and outside an organisation. The term data theft can give the impression that this kind of breach is based on malicious intent, but this is…

What Is Provisioning and Deprovisioning?

Provisioning is the process of making information technology (IT) systems available to users. Depending on your organisation’s needs, provisioning can be defined at the network, server, application, and user level: Network provisioning involves setting up a network that can be accessed by users, servers, and devices. The telecommunications…

The Dogfooding Chronicles: Work From Home Edition

The Dogfooding Chronicles are BACK! And, like everyone else, we’re dogfooding from home these days. The move home has been a period of transition for everyone, but the one thing that wasn’t difficult? Getting the Okta workforce home and working—very quickly. And there’s no better Oktanaut to tell that story than our guest blogger Christopher Flynn…

What Is Biometric Authentication?

Biometric authentication is a security process that compares a person’s characteristics to a stored set of biometric data in order to grant access to buildings, applications, systems, and more. With cybercrime, fraud, and identity theft on the rise, it’s more important than ever for businesses to help customers and employees verify their identity,…

What Is a Password Manager and Is It Safe to Use One?

A password manager is an application that stores and manages online credentials—think of it as a type of vault that keeps passwords safe. In addition, password managers make it easier to access apps and websites since they can automatically input login details. Everyone who uses a computer or smartphone is likely familiar with switching between…

99.99% Uptime For Every Customer

Identity has become a cornerstone of our digital lives, whether it’s through technology adoption at work, personal app usage at home, or anywhere in between. The fundamental role of identity manifests through nearly every person who connects to the internet, as each app, service, or tool needs to identify exactly who the user is. Reliable access…

What Is Data Misuse?

Data misuse is the use of information in ways it wasn’t intended for. User agreements, corporate policies, data privacy laws, and industry regulations all set conditions for how data can be collected and used. Data misuse violates these requirements. Unlike data theft, data misuse doesn’t necessarily happen as a result of a cyberattack or when…

Securing Remote Work Any Time, Anywhere, at Scale

Today, we’re excited to announce how Okta is working with CrowdStrike, Netskope, and Proofpoint to help organisations implement a modern, comprehensive, and integrated security strategy needed to protect today’s dynamic and remote working environments at scale. The COVID-19 pandemic has ignited a sudden shift to remote work, driving an…

Archive

Follow Us
Share on Linkedin Share on Youtube