Category: Identity Access Management (IAM)

third party password compromise represented by the word "password" glowing in green inside lines of binary code in shades of blue
December 14, 2020

Is Third Party Password Compromise Your Achilles Heel?

Third party password compromise is a top risk as Dark Web data like password lists grows. Here’s how to protect your business.

Read More
ransomware protection presented as a hand with a key reaching from one laptop screen over another over a world flat map in red and white
October 19, 2020

CISA, NIST Ransomware Protection Guides Highlight Simple Solution

Ransomware protection is more essential than ever. Guides from CISA & NIST point out the value of a simple solution.

Read More
IoT dangers represented by many device icomns connecting to a single person
October 13, 2020

Are You Including IoT Danger in your Cybersecurity Planning?

Have you accounted for the additional risk that business and employee IoT devices bring to the table in your cybersecurity strategy? Here’s how to guard against IoT danger.

Read More
credential stuffing represented by a blue lock on a darker bluw background with semitransparent binary code in pale blue
October 03, 2020

Credential Stuffing Attacks Cause FBI Concern

Credential stuffing attacks are ramping up, and the FBI points to a lack of multifactor authentication as a major cause for concern.

Read More
CISO top priorities represented by a woman manipluationg writing on a futuristic screen with her hands
September 05, 2020

Identity & Access Management Rules CISO Top Priorities

CISO top priorities have changed drastically in the wake of COVID-19. See why secure identity and access management tops the new list.

Read More
February 25, 2020

Consumers Are Skeptical About Biometric Data Security: How Companies Can Respond

In 2014, Apple’s introduction of the iPhone 6 was more than just an exciting iteration of its flagship product – it was the launch of Touch ID. This blockbuster device ushered in a new era of widespread biometric data use for the layman. Fingerprints had replaced passcodes as device gatekeepers, charged with protecting the most important, sensitive information.

Read More
November 15, 2017

Identity Theft’s Reality

ID Agent is excited to offer this guest blog post from Megan Wells. Megan is a data journalist and content strategist at InvestmentZen who has written content on how data theft impacts Americans, technological interventions for personal and commercial finance and content for IBM and NASDAQ. With her examination of costs and the impact of Data Breaches, she shares how detrimental identity theft can be for MSP customers and their employees. Be sure to download her useful Infographic at the link below!

Read More
May 22, 2017

Five Steps to Protect Your C-Suite from Corporate Identity Theft

Since 2003, the FBI has tracked more than $740 million dollars lost to business email compromise (BEC) fraud in the United States. Who’s the main target? None other than the C-Suite. Led by organized online criminal groups, BEC is one of the fastest growing types of financial fraud.

Read More
April 10, 2017

5 Ways to Better Secure Your Employees’ Passwords

As providers of comprehensive cybersecurity solutions, we’re often asked how an organization can better ensure that their employees are being safe online. There are numerous ways to prevent a data breach, from the implementation of a threat intelligence tool to network security protocols thatscreen your supply chain.

Read More

Please fill in the form below to subscribe to our blog