Mobile Device Security: 4 Challenges to Overcome

Today’s workforce looks increasingly like a constellation: various individual endpoints connect together to deliver on a company’s objectives. And that constellation is always growing—users have transitioned away from operating solely on corporate devices. Today, work involves being able to access resources and applications from the comfort of…

Compliance and Consent: The Privacy Factors that Help Drive User Trust

If there’s one thing we took away from this year’s RSA Conference, it’s that privacy is top of mind for today’s organisations. But how can they abide by the many emerging privacy regulations without creating tedious user experiences? The answer: by adopting secure data handling practices that build user trust—while still providing delightful…

Putting Privacy First: Takeaways from RSA Conference 2020

What happens when you put hundreds of security professionals in a room? They come together to identify and discuss the emerging cybersecurity trends, challenges, and opportunities. At this year’s RSA Conference, the theme was “Human Element,” reminding us that every technology-related decision, innovation, and risk has direct impacts on…

The NIST Privacy Framework: Why it Matters

Okta’s vision is to be the platform that enables any organisation to adopt any technology. To achieve that goal, it’s critical that Okta customers and partners have complete trust in our ability to keep their data private and secure. As such, we are constantly aligning our operations with comprehensive data privacy standards, developing best…

Building Consumer Trust: 4 Challenges to Offering Secure User Authentication

No brand can be successful without customer trust. But as organisations handle and store more customer data than ever—data that’s increasingly targeted by cyber criminals—that trust is harder to earn and even harder to keep. In my previous post, I discussed the various stages of the customer journey that are crucial to building and retaining user…

4 Steps to Building Consumer Trust

As cyber criminals become more refined in their exploits, customers and their personal information are being increasingly targeted—and that poses a growing threat to organisations. Today, according to the Ponemon Institute, the cost of a data breach is $3.92 million, including non-operational factors like reduced brand engagement and compromised…

When to Retire the Monolith: Is a Move to Microservices in Your Future?

We’ve seen monumental changes in personal computing over the past few decades. The more sophisticated a device becomes, the more compact its design and the more advanced its capabilities. Take mobile phones: their first iterations were cumbersome and slow compared to the sleek, fast smartphones we now carry in our pockets. And modern-day laptops…

What is Phishing?

In today’s increasingly digital environment, employees and contractors can sign into workplace applications and systems from anywhere with a simple set of credentials. And while this might make things easier for employees and contractors alike, it also puts organisations at heightened risk of a specific form of cybercrime: phishing. Designed to…

Data Privacy Day: 5 Tips to Help Keep your Private Data Private

As new technologies continually integrate themselves deeper into the lives of average consumers, these users increasingly benefit from the enhanced productivity and convenience that these technologies offer. That being said, knowing how to leverage these technologies in a way that optimises personal privacy isn’t always intuitive for the average…

3 On-Prem Security Myths Debunked

As technology evolves, we’re often faced with misconceptions around how it works and how we can use it. Whether it’s that Apple computers are immune to viruses or that private browsing keeps user activity anonymous, there are a number of security myths that surround our technology—and change how we use and protect it. This trend applies to both…

Archive

Follow Us
Share on Linkedin Share on Youtube