5 Must-Have Cyber Security Policies for your Organization

5 Must-Have Cyber Security Policies for your Organization, by Sajid Shafique One of the most essential factors in maintaining a good security posture for an organization is setting forth the expectation of what is allowed and what is not. Any action that the organization might take, ranging from implementing technical controls like setting up a […]

Reasons To Be Thankful for Cybersecurity, Part One

This week, we revisit the reasons behind phishing, and some of the newest phishing stories to break. Want to learn more about how to keep from being a victim? In a few words: vigilance, planning, and updates updates updates. Thanks for checking out our biweekly digest of articles for Identity Management Professionals. Click here to view […]

Holiday Reading for Healthcare IAM Professionals

This week, we check out several reasons why, despite more security spending and defenses, ransomware and malware attacks are on the rise. We’ll look into methods for healthcare organizations to keep ahead of this dangerous curve, and how effective those methods have been in 2021 so far. All this and more with Idenhaus! Thank you […]

November Reading for IAM Professionals

This week, we look at a comparison of cybersecurity to the popular show The Squid Games, talk about removing admin privileges (without teeing anyone off), and the new use for a Civil War era government Act that is going to start applying to cybersecurity. Join us for all this and more… Thanks for checking out […]

IAM Best Practices: Initial Population Of ID Stores

At the heart of it, Identity Management solutions are intended to help make identity management easier, not more difficult. However, when not properly implemented, solutions that are designed to help can really seem more like a hindrance. Let’s talk best practices for ID stores, a basic component of a good overall IAM solution. Why ID […]

October Articles for Identity and Access Management

This week, we take a dive into the psychology of hacking humans, and why that’s so profitable right now. We are watching the future of cybersecurity unfold both for government and businesses, and how that will affect the coming month and years. As always, we look to keep our readers safe and up to date […]

Newly Gathered Healthcare Articles for IAM Professionals

This week, we’re learning more about FIN12, an aggressive and sneaky new form of Smishing, or SMS-phishing, and how to keep from that. Hint: don’t click links on your phone from anyone you don’t recognize. We also take a look at the new threats against the healthcare sector, and how your organizations can stay clear […]

Security Questions- Boon or Bane?

We’ve all done it- filled out a casual quiz on social media, or answered silly questions which, thinking about it, might be answers to those security questions they ask when you login… Let’s have a look at the reason behind security questions, and then ask ourselves: how can we remember all of this? How tempted […]

Freshly Gathered Healthcare and Cybersecurity Articles

Thank you for checking out our biweekly digest of articles for healthcare IAM professionals. We try to curate articles of interest for you, and would love to hear your feedback! Leave us a comment to tell us which article was the most help to you. Want to know more about IAM for healthcare, or in […]

Cybersecurity and Healthcare Updates

This week, we explore the new trend of distributed denial of service (ddos) attacks on the healthcare sector,  the major skills gap in healthcare IT cybersecurity training, and more in our healthcare-focused cybersecurity update.  Thank you for checking out our biweekly digest of articles for healthcare IAM professionals. We try to curate articles of interest […]