Implementing Okta MFA: 4 Things to Consider

It’s now common knowledge that implementing multi-factor authentication (MFA) is a no-brainer. Not enabling multi-factor authentication is like leaving the door to your home wide open, with all the lights on, with signs pointing to where your precious belongings are stored. But with that said, implementing MFA is easier said than done.  In our…

What Is a Password Manager and Is It Safe to Use One?

A password manager is an application that stores and manages online credentials—think of it as a type of vault that keeps passwords safe. In addition, password managers make it easier to access apps and websites since they can automatically input login details. Everyone who uses a computer or smartphone is likely familiar with switching between…

Advisory 2020-008: Mitigating the Risks of Copy-Paste Compromises

Australian Prime Minister Scott Morrison recently raised awareness of a state-based cyber attack that Australia is facing across all levels of government and the private sector. In response, the Australian Cyber Security Centre (ACSC) published an advisory on the nature of the attacks as well as guidance on how to mitigate these types of attacks…

99.99% Uptime For Every Customer

Identity has become a cornerstone of our digital lives, whether it’s through technology adoption at work, personal app usage at home, or anywhere in between. The fundamental role of identity manifests through nearly every person who connects to the internet, as each app, service, or tool needs to identify exactly who the user is. Reliable access…

What Is Privileged Access Management?

Privileged access management (PAM) is a way of authorizing, managing, and monitoring account access with a high degree of administrative permissions. This is done to protect an organization’s most critical systems and resources. These “super user” accounts are isolated within an encrypted repository or vault. The access of these systems is…

Cloud-First Agility to Securely Remote Enable Your Workforce

In my previous blog, I introduced the concept of why hybrid, cloud-first, identity solutions are fundamentally different from those with an on-premises-first focus, providing you with a huge competitive advantage. Over the next few blog posts, I’ll be digging deeper into these differences, and detailing the advantages you’ll get by adopting Okta’s…

Archive

Follow Us
Share on Linkedin Share on Youtube