What Is a Data Breach?

A data breach happens when cybercriminals gain unauthorised access to a system or network, allowing them to search for sensitive data pertaining to a business and its customers, and using it to extract some form of illegal value. Attackers might sell this data on the dark web, directly engage in fraud, hold the information for ransom, or use it to…

What Is Data Security?

Data security is the protection of digital data and accounts in accordance with laws and industry standards in order to mitigate risks and repel attackers. It encompasses business data, employee information, and customer and user data. If that sounds multifaceted, it is: putting data security into practice isn’t one size fits all. With companies…

How Okta + AWS SSO Simplifies Admin and Adds CLI Support

Millions of users across an array of enterprises depend on the cloud infrastructure of Amazon Web Services (AWS) and the seamless convenience of Okta Single Sign-On (SSO) to power their web and mobile platforms. The demand for cloud-enabled identity and access management (IAM) has exploded across the business landscape. And as organisations move…

Why You Should Ditch SMS as an Auth Factor

In my previous post, I talked about how the COVID19 pandemic has impacted how our customers use MFA — more specifically how SMS authentication is on the rise as organizations look to rapidly roll out a quick and easy secondary auth method in response to the need to embrace remote work. In this post, I’ll go into more detail around issues with SMS…

MFA Trends: The Impact of COVID19

The COVID pandemic has changed how we do many things. In the workplace, it’s pushed us to take a deeper look at how we enable employees to work remotely—and to ensure that they can do it securely. But what does that actually look like? According to our recent Businesses @ Work (from Home) report, companies are adapting and evolving quickly…

Mobile Device Security: 4 Challenges to Overcome

Today’s workforce looks increasingly like a constellation: various individual endpoints connect together to deliver on a company’s objectives. And that constellation is always growing—users have transitioned away from operating solely on corporate devices. Today, work involves being able to access resources and applications from the comfort of…

Compliance and Consent: The Privacy Factors that Help Drive User Trust

If there’s one thing we took away from this year’s RSA Conference, it’s that privacy is top of mind for today’s organisations. But how can they abide by the many emerging privacy regulations without creating tedious user experiences? The answer: by adopting secure data handling practices that build user trust—while still providing delightful…

Putting Privacy First: Takeaways from RSA Conference 2020

What happens when you put hundreds of security professionals in a room? They come together to identify and discuss the emerging cybersecurity trends, challenges, and opportunities. At this year’s RSA Conference, the theme was “Human Element,” reminding us that every technology-related decision, innovation, and risk has direct impacts on…

The NIST Privacy Framework: Why it Matters

Okta’s vision is to be the platform that enables any organisation to adopt any technology. To achieve that goal, it’s critical that Okta customers and partners have complete trust in our ability to keep their data private and secure. As such, we are constantly aligning our operations with comprehensive data privacy standards, developing best…

Building Consumer Trust: 4 Challenges to Offering Secure User Authentication

No brand can be successful without customer trust. But as organisations handle and store more customer data than ever—data that’s increasingly targeted by cyber criminals—that trust is harder to earn and even harder to keep. In my previous post, I discussed the various stages of the customer journey that are crucial to building and retaining user…

Archive

Follow Us
Share on Linkedin Share on Youtube