Blog

STEP UP YOUR CLASSROOM TECHNOLOGY WITH SINGLE SIGN ON!

Posted by Mia Johanson

Thanks to the ever-growing internet of things (Iot), school campuses are now more equipped with software and technologies than ever. Digital learning tools, including learning management systems (LMS), remote classrooms (streaming) and gadgets to assist and connect, have infiltrated our classrooms, with students and instructors embracing new and better educational Read more

RED ALERT: LESSONS TO LEARN IN THE WAKE OF MAJOR EQUIFAX BREACH!

Posted by Mia Johanson

800 Million Individual customers. 88 Million Businesses. The oldest consumer credit organization in the USA. Big Three – one of the largest credit agencies. US$ 3.1 Billion in annual revenue. 9,000+ Employees in 14 countries. Yet, it happened. Equifax is was a reputable consumer credit reporting organization based in Atlanta, Read more

STEP UP YOUR SECURITY: GET A SMARTER STANCE ON IDENTITY MANAGEMENT

Posted by Mia Johanson

A decade ago, when cloud computing was still a thing of future, security was least of the concerns. Back then, fewer companies used internet to communicate across the organization. Even though access to internet was common and Google was the coolest place to look up for information, a one-person IT Read more

Password: How To Keep It Secure?

Posted by Mia Johanson

The password system and internet, as it stands these days, is surely not working as hard as it should. With the ever-growing list of security breaches and endless series of shameless snooping into public and private accounts, we are frequently told to reinforce our passwords and strengthen them to keep Read more

Internet Security Debacle Is Not Over Yet: Not Even Big Names Are Secure!

Posted by Mia Johanson

Internet is a treacherous place. And we, end users, are always learning ways to get along well in this World Wide Web. Internet has become so much part of our life that it is hard to imagine a world without it. We have become adapted to googling everything from a Read more

[INFOGRAPHIC] The Path To CIO Success: Top IT Priorities and Challenges!

Posted by Mia Johanson

Given that 40% of the world’s population has an internet connection today and approx. 99% of businesses using internet either as a source of information or to perform everyday operations, it is safe to say that every company today is a technology company irrespective of the market vertical it operates Read more

Top 3 CyberSecurity Trends: How To Keep Your Business Safe in 2016!

Posted by Mia Johanson

In an increasingly connected world – where social media is the norm of life, mobility is a must and cloud is the go-to place for all online activities – the need to secure personal and professional identities is more vital than ever. From resource management to marketing and promotion, everything Read more
Cloud Apps for SMBs

12 Cloud Apps That Are A Must For Small Businesses (SMBs)

Posted by Mia Johanson

The cloud is has come to the workplace with a bang. It is the hub where business collect, store, disseminate and analyze data based on their preferences. It is the go to resource for businesses to conduct research and gather valuable information about their customers, competitors, product/services and almost everything. Read more

Multi-Factor Authentication With Identacor: Faster, Cheaper and Safer!

Posted by Mia Johanson

Multifactor authentication is nothing new. It has been around for quite a while. You might have already used multifactor authentication for signing into a social media account or a mobile app but you probably didn’t know the term. What is multifactor authentication? Why it is essential in today’s world? How Read more

10 Warning Signs You Have Been Hacked!

Posted by Mia Johanson

Peace of mind is a luxury in today’s fast-paced cyber world. Malicious hackers and criminals are on tip of their toes with cutting-edge technologies at their disposal to sneak into individual accounts to steal digital valuables including personal data, corporate data, credit card details and more. And as our security Read more

5 Challenges To Overcome To Build A Thriving Cloud Infrastructure In Education!

Posted by Mia Johanson

Educational establishments continue to explore opportunities to step up their management game and improve administration of resources. The economic crisis that took the world by storm left educational institutes with meager resources and stiffed out investment funds with agencies, both government and private sector, conferring less cash than before to Read more

8 Tips To Protect Your Business From Cyber Snoops!

Posted by Mia Johanson

Cyber Snoops are always on a hunt for soft targets to steal personal data, financial info, intellectual property or other documents that are valuable to an individual or the organization. The purpose obviously is to manipulate stolen information for monetary gains including fraudulent funds transfers, illegal trade of corporate accounts Read more

5 Reasons Your Business Needs Cloud Directory To Improve Productivity!

Posted by Mia Johanson

Being organized is being in control. Cloud computing is bringing drastic changes to the way we do business. Employees are now using more cloud apps than ever to do their jobs. Traditional technologies are being replaced with newer business-centric applications at a fraction of the cost without compromising on performance. Read more
Mobile Identity Management

[INFOGRAPHIC] Mobile Identity Management: Trends & Threats Shaping The Future Of Communication!

Posted by Mia Johanson

In contrast to our elder counterparts, we are now more inclined to engage on mobile devices. A greater percentage of online users now use mobile to do mobile browsing, communication, online searching, social networking, video sharing and even reading. In 2015, Facebook announced that out of its total base of Read more

Breaking The Stereotype: Women In Tech And 5 Role Models To Look Up To!

Posted by Mia Johanson

It is a common knowledge that Silicon Valley lacks gender diversity. Every year thousands of younglings enter into this land-of-dreams with ambitions to make a difference and influence the social and economic share of the business but very few of them live up to their dreams. Lots of them find Read more

The Impact of Phishing Attacks – and How To Stay Safe!

Posted by Mia Johanson

Earlier this month (February 3rd, 2016 to be precise), Magnolia Health Corporation in California learned its lesson in cyber security the hard way. Someone impersonated Kenny Moyle, CEO of Magnolia and got on board with a spoof email calling all active employees of the organization and all the facilities managed Read more
Gartner's Predictions For IT Pros

Gartner’s Top 10 Strategic Predictions For IT Managers!

Posted by Mia Johanson

Every year Gartner Inc. comes up with predictions to facilitate and forewarn CIOs, IT Strategists and managers. These predictions not just articulate what to expect in the next 12 months or beyond but they also provides an on-the-money view on trends and technologies that will take place in business sector. As Read more

Why Whitehouse Wants You To Prioritize Cybersecurity?

Posted by Mia Johanson

Digital disruption has reformed our routine life in great ways. From online shopping to everyday cooking and running a business to managing the more than ever diversified workforce, internet has reshaped everything and more. But while internet biosphere presents boundless opportunities for businesses, social reforms, economic state of the world Read more

In The Wake Of Security Nightmare: Why We Need An Identity Management Solution?

Posted by Mia Johanson

The never-ending gossip about recent security breaches worldwide – From Target to SONY, Anthem Inc. and Home Depot – is proof enough that online marketplace, if not secured, is at risk above and beyond our rationale. Not even those most promising industry tycoons or seemingly impermeable enterprises are secure from Read more

Identity and Access Management (IAM) In 2015: Challenges and Implementation Strategy

Posted by Mia Johanson

Cloud adoption is on the rise. There is no stopping to the cloud growth till businesses find another better alternative to store, secure, distribute, publish, manage and process their valuable data. Believe it or not, this is not happening any time soon. The spending on cloud computing is projected to Read more

All You Need To Know About SAML Protocol!

Posted by Mia Johanson

The Security Assertion Markup protocol, commonly known as SAML protocol, is a fundamental part of our services at Identacor. Therefore, it is important for our audience to understand the basics of SAML and how it helps us deliver the best return on your bucks in terms of identity management and Read more

12 Obvious Benefits of Cloud-Based Identity and Access Management (IAM)

Posted by Mia Johanson

The ever-increasing cost of traditional IT infrastructure has led us to this cloud computing age where software as service (also known as Saas) has assumed the place of conventional on-premises infrastructure. Custom code integration and the support needed to deploy and run enterprise identity software comprised of the major costs Read more

Internet of Things (IoT) Is Mounting Up Fast, Are You Ready?

Posted by Mia Johanson

Internet of Things (IoT) is no doubt making its way into the mainstream as we embrace more and more connected technologies into business. The development is probably slow but no matter how it plays out in the time to come, there will obviously be implications for the enterprise. So, even Read more

10 Geeky Fathers Who Are Also Safeguarding The Web!

Posted by Mia Johanson

Father’s Day is just less than a week away and internet is flooded with gift ideas, pinspirations and hashtags to kick-off the most stirring occasion for all the fathers out there. Annual Father’s Day is not just a great time to show affection to your dad with a perfect gift Read more

The Power of Password …

Posted by Mia Johanson

Following a security breach that compromised a database of over 145 Million registered users, EBay Inc. – one of the largest online retailers – sent out an email urging users to change their passwords. The cyber-attack exposed a huge part of user database to the anonymous hackers including encrypted password. Read more

The Ultimate Cheat Sheet on Social Media Privacy

Posted by Mia Johanson

In today’s connected world, a private life stands no chance. In just a short span of time, social media has become a commodity for users worldwide where this inevitable and ubiquitous media provides them a constant engagement platform with a multifaceted sequence of connectedness. What started as a platform for Read more

[INFOGRAPHIC] The Security Challenges of Cloud Model

Posted by Mia Johanson

Cloud Computing has become the heart of IT infrastructure in the enterprise. Granting numerous benefits to the enterprise, cloud technologies have become hard to ignore. From scalable infrastructure to pay-as-you-go price plans and flexible deployment options, cloud computing is all about cost effective solutions and ease of use. Hence, enterprises Read more

Bad Passwords And What They Cost You?

Posted by Mia Johanson

Do you know how much havoc a lost password can cause or what is the cost of a bad password? Sit tight and read this article carefully, for it might just blow you away! Passwords are ubiquitous. With the proviso that we are committed to bring our world together using Read more

Heartbleed: All You Need To Know About The Catastrophic Bug!

Posted by Mia Johanson

“Catastrophic is the right word. On the scale of 1 to 10, this is an 11.” — Bruce Schneier, Independent Security Expert Earlier this week, hundreds of thousands of servers (websites, email, communication, virtual networks and what not) fall victim to a catastrophic bug, called Heartbleed, around on the internet. Read more

[INFOGRAPHIC] 20 Cloud Computing Indicators for CIOs!

Posted by Mia Johanson

Enterprise cloud computing has grown into a bigger and extensive term which is now the center of organizational development programs, be it infrastructure, marketing, communication or other functions. It offers organizations with the flexibility to augment capacity and introduce new capabilities on the go, with no substantial cost, deliberate learning Read more

Bring in some BYOD Love!

Posted by Mia Johanson

With the entrenchment of more and more personalized devices and cloud-based applications in the enterprise, BYOD has become one of the most talked about acronyms on the Web. BYOD (Bring Your Own Device), also known as BYOT (Bring Your Own Technology), allows knowledge workers to bring their own devices including Read more

Best Practices To Implement A Safer Identity And Access Management (IAM) System

Posted by Mia Johanson

Identity and access management (IAM) is a significant part of efforts to manage risk and address increased governing assessments. On top of that, with companies facing multitude of IAM challenges such as identity theft, data breaches, unauthorized access and more, it has become more important than ever to protect corporate Read more

Identity and Access Management (IAM) – Why is it important for the enterprise?

Posted by Mia Johanson

Information technology is playing a key role in boosting economy. Many businesses are based solely on cyber activity. Buying and selling is no longer restricted to brick and mortar establishments and services are available in exchange for online currency; i.e. bitcoin. With a future as bright and progressive as this Read more

20 Interesting Cloud Computing Streams To Follow On Twitter!

Posted by Mia Johanson

The cloud computing market continues to grow in 2014. As it expand far and wide, companies seek cloud computing experts to help them with adoption and implementation to make the most out of this novel tech. The revolution in technology has empowered professionals in all walk of life to source Read more

Federated Authentication: An effective security solution for the Enterprise?

Posted by Mia Johanson

Personnel management is becoming a significant concern for enterprise with the proliferation of software as a service (SaaS) and other web based cloud apps. If you are a corporate user, just think about the number of credentials you input on a regular basis.  You perhaps log into your company’s network, Read more

Identity and Access Management (IAM) Challenges in 2014

Posted by Mia Johanson

A growing majority of traditional on-premises identity and access management (IAM) infrastructures are now replacing or moving towards to embed or enable support for software as a service (SaaS) and cloud based endpoints. To keep up with hybrid nature of these emerging technologies, enterprises are forced to build strategies to Read more

Biggest security breaches of 2013 and what we can learn from them?

Posted by Mia Johanson

The power outage of the information age, online security breaches and data hacks, are no doubt becoming unavoidable, devastating and completely worth it for the ease and comfort we stem from the service that come under bout. For instance, the internet cried foul last week when the news broke that Read more

Identity and Access Management in 2014

Posted by Mia Johanson

As information technology (IT) is taking center stage for economic activity, the corporate sector is investing more and more in cyber security services. Many organizations are paying heavily to secure their computing environment. To guarantee its safety, the information technology security companies offer a systematic method to block threats at Read more

Woz Wows Audience with Keynote Speech at the ITEXPO Las Vegas 2013

Posted by Mia Johanson

The annual ITExpo was held this year at the Mandalay Bay Convention Center in Las Vegas.  The event has become the premier business communications and technology event for enterprise, government and SMB end-users, resellers, service providers, manufacturers, developers, media and analysts. This year’s choice of keynote speaker garnered quite a Read more

Managing External Identities

Posted by Mia Johanson

In the last few years, Identity Management systems and applications have undergone a radical change.  In the old days, a newly hired worker could easily be assigned privileges and application access, as well as authorized and authenticated as needed by using a simple system which allowed for effective management of Read more

Infographic – The Need for Cloud Based Identity Management

Posted by Mia Johanson

The Need for Cloud Based Identity Management Get a snapshot of facts and figures on Cloud Identity Management in this infographic.           Download Full Infographic as a PDF Read more

The Importance of Offboarding

Posted by Mia Johanson

Most companies make good use of the on-boarding process to provide new employees and contingents with the knowledge, skills and system access to make sure they have admittance to everything they need as fast as possible in order to quickly become effective. However, the IT systems, applications and confidential data Read more

Why Cloud Computing is In It to Win It

Posted by Mia Johanson

Cloud computing has taken IT-land by storm. However, many skeptics wonder whether this technology is sustainable. The threats of data loss and cyber attacks top the list of possible failures of cloud computing, preventing consumers from a 100% conversion to SaaS. Despite the daunting criticisms, protagonists of cloud computing are Read more

Broadened Horizons: Identacor Partners with Zendesk

Posted by Mia Johanson

Identacor recently announced its esteemed partnership with Zendesk (www.zendesk.com), an online SaaS-based customer service provider. Zendesk is a trusted name among 20,000 business clients that use this hosted software to allow their helpdesk agents to better manage and respond to service requests. By providing users with SSO access to Zendesk, Read more

Identity Management Systems: A Safer Place without Passwords

Posted by Mia Johanson

In a world where sensitive data from millions of users is stored online, password security is a crucial matter for all companies. Any shortcoming in this responsibility can mar the image of the company beyond repair. With cyber attack cases on the rise, the most recent victim, Living Social, a Read more

How Identacor Can Revolutionize Your Corporate Cloud Computing

Posted by Mia Johanson

4 Unbelievable Ways How Identacor Can Revolutionize Your Corporate Cloud Computing A desktop PC at work, iPad at home, smartphone on the train and a laptop in the conference room: your remote-working employees are logging in from a variety of devices for all the different internet-based apps that they use. Read more

About Author

Mia Johanson is an internet security consultant with CA based Identacor. She is particularly interested in big data and cloud technologies that are shaping workplace collaboration and our online experiences. Mia is a veteran in cloud computing, tech trends and identity and access management solutions. She can be reached at @MiaJohanson.

Find Us

Contact us

1-855-338-8355

Identacor LLC Newport Beach, CA USA 92660

(213) 260-0080

support@identacor.com
sales@identacor.com
privacy@identacor.com