It’s obvious the rise of SaaS (software-as-a-service) has changed the game.
The benefits of subscribing to a cloud-based application service are already
well-known and documented: cost-efficiencies, speed, hands-off maintenance,
etc… It’s no longer an emerging practice and, for most IT managers, has
become an inextricable component of any go-forward IT network strategy. What
this means is now there are dozens of new sign-ons per user from a variety of
endpoints (including mobile and tablet). And if we are talking
enterprise-wide deployments, this is can be as challenging as herding cats.
And since it is highly likely, a SaaS portfolio will continue to grow, so
will the challenges and the need to centralize authorization and control of
all these new applications. Many organizations have considered single-sign
on, but during recent needs for economic belt-tightening, s... (more)
Users are making it too easy for hackers.
If we take a closer look at the 6.5 million hashed LinkedIn passwords that
leaked we find a large swath of the user population are ignoring warnings of
overly simplistic and obvious passwords. Would you believe the most common
word or phrase found in a 160K sampling of the list was “link”? And would
you further shake your head in disbelief that “1234” and “12345”
followed close behind. Rounding out the top 10 were “work,” “god,”
“job,” “angel,” “the,” “ilove,” and “sex.”
More so than Facebook, LinkedIn is the social media of choice for bu... (more)
It's not a new term or concept. You probably recognize that it’s happening
within your own organization. Shadow IT is the appropriation and use of IT
assets and applications without organizational approval. And it happens
more than you know. Sally the sales rep gets a label template design
application, Marco from HR downloads software that manages inbound resumes.
Kelsey in marketing signs up for a WordPress page and social media accounts.
All too often, employees are not going through corporate channels to get what
they need to achieve their goals.
And every time they do, the ... (more)
Happy holidays to all of you and may the season keep your perimeters
protected, your assets secure and your networks free of nasty little elves!
Twas the night before Christmas
and all through the net
No access was stirring;
No hackers as yet.
Murphy in sales was showing his app
Tweeting and downloading with only a tap
I grumble and moan ‘cause I know it to be.
That his iPhone and iPad was BYOD
Then out on the site there arose such a clatter,
I sprang from the help desk to see what was the matter.
Without my UniSec dashboard, I would not know
If the network alert meant friend or meant fo... (more)
Effectively managing individual online user identities while controlling
their specific application and data access privileges continue to be a
challenge for IT administrators. CloudAccess, a leader in cloud-based
security solutions is hosting a complimentary webinar that address best
practices to overcome the issues of complexity, expense and available
The 45-minute presentation, titled "One Click...From Directory to Cloud," and
scheduled for May 22nd and 28 at 11:00am PDT, boldly asks the question, "What
if you could add a user from any directory or database and it s... (more)