What Is Social Login and Is It Worth Implementing?

Social login, also known as social sign-in or social sign-on, uses information from social networking sites to facilitate logins on third-party applications and platforms. The process is designed to simplify sign-in and registration experiences, providing a convenient alternative to mandatory account creation. For users, social login is a…

What Is Spear Phishing?

Spear phishing is a form of cyber attack targeted at a particular person or small set of individuals. In these scams, bad actors research their chosen targets and attempt to convince them to surrender sensitive data or financial information. Spear phishing attacks may also aim to infect user devices with malware, allowing attackers to steal the…

What Is Data Theft?

Data theft is the act of stealing information stored on corporate databases, devices, and servers. This form of corporate theft is a significant risk for businesses of all sizes and can originate both inside and outside an organisation. The term data theft can give the impression that this kind of breach is based on malicious intent, but this is…

What Is Provisioning and Deprovisioning?

Provisioning is the process of making information technology (IT) systems available to users. Depending on your organisation’s needs, provisioning can be defined at the network, server, application, and user level: Network provisioning involves setting up a network that can be accessed by users, servers, and devices. The telecommunications…

The Dogfooding Chronicles: Work From Home Edition

The Dogfooding Chronicles are BACK! And, like everyone else, we’re dogfooding from home these days. The move home has been a period of transition for everyone, but the one thing that wasn’t difficult? Getting the Okta workforce home and working—very quickly. And there’s no better Oktanaut to tell that story than our guest blogger Christopher Flynn…

What Is Biometric Authentication?

Biometric authentication is a security process that compares a person’s characteristics to a stored set of biometric data in order to grant access to buildings, applications, systems, and more. With cybercrime, fraud, and identity theft on the rise, it’s more important than ever for businesses to help customers and employees verify their identity,…

99.99% Uptime For Every Customer

Identity has become a cornerstone of our digital lives, whether it’s through technology adoption at work, personal app usage at home, or anywhere in between. The fundamental role of identity manifests through nearly every person who connects to the internet, as each app, service, or tool needs to identify exactly who the user is. Reliable access…

What Is Data Misuse?

Data misuse is the use of information in ways it wasn’t intended for. User agreements, corporate policies, data privacy laws, and industry regulations all set conditions for how data can be collected and used. Data misuse violates these requirements. Unlike data theft, data misuse doesn’t necessarily happen as a result of a cyberattack or when…

What is a One-Time Password (OTP)?

A one-time password or passcode (OTP) is a string of characters or numbers that authenticates a user for a single login attempt or transaction. An algorithm generates a unique value for each one-time password by factoring in contextual information, like time-based data or previous login events. Tech support teams typically administer OTPs to…

Archive

Follow Us
Share on Linkedin Share on Youtube