How to secure a hybrid workplace and remain productive?

We explore how IT leaders can build resilient hybrid work strategies that ensure their teams can collaborate and remain productive in the face of a growing cyber threats. Along with how, where, and when we work, the way we think about work is changing. In fact, The Economist declared “hybrid work” the word of the year for 2022, noting that the…

Secure User Identities in Your Zoom Calls — Authenticated by Okta

Today’s workforce is dynamic with employees working from the office, home, and other remote locations across the world. For organisations, Zoom has increasingly become the de facto solution for video conferencing, connecting them to employees and customers. But the shift to remote and hybrid work has left IT and security teams with a new challenge…

How Can You Optimise Hybrid Working in Your Organisation?

It’s no longer new, it’s no longer trendy, and it’s no longer temporary. In Europe, hybrid work is here to stay. As the dust settles in the aftermath of the short-term crisis period provoked by the outbreak of the COVID-19 pandemic. It’s becoming increasingly clear that widespread adoption of flexible and hybrid working models will be part of the…

How Can Hybrid Working Help You Progress Towards Net Zero?

In this blog, Alison Colwell explores the benefits that adopting hybrid working can bring to organisations who are committed to sustainability and reducing their green house gas (GHG) emissions. What was once seen as a temporary response to the short-term crisis engendered by the COVID-19 pandemic has now become the norm across the U.K. and…

Meet the Experts: Solving for Compliance Needs with IAM

By adopting a modern Identity strategy, organisations can support many critical initiatives—from boosting workforce productivity to streamlining end-user experiences.  Organisations that collect and store personal information are subject to a broad range of data protection and privacy laws that vary based on where in the world they conduct their…

3 Surprising Ways Identity Creates Business Value

This is the third blog in our series on building a business case for a new Identity and Access Management (IAM) solution. In the first article, I described five steps that every business decision-maker should take to build a convincing case for an enterprise software and/or technology investment. In the second, I took a deeper dive into the…

7 Key Data Privacy Laws for 2023

Compliance with data privacy law doesn’t just protect end users’ personal data—it also provides critical cyber security defenses for organizations. Employees and customers now expect the freedom to safely sign on from anywhere and companies are adopting and managing more cloud-based tools; meanwhile, data breaches continue to escalate in frequency…

Building a value framework for Identity

In the first blog in this series, I talked about how to build a business case for implementing a new Identity and Access Management (IAM) solution, though the principles involved are general ones that can be applied to any technology purchasing or services procurement decision. Here, I’ll take a deeper dive into one of the five steps in building a…

5 Key Lessons from The Okta Hybrid Work Report 2023

Yes, that’s right - another report speculating about the future of work! And before you say anything I can assure you, we have seen all of the buzzwords and trends in the press too: The introduction of the four-day-work week  The proliferation of AI and automation tools  The mass installation of executive hammocks in offices to support corporate…

Archive

Follow Us
Share on Linkedin Share on Youtube