An absolute nightmare for an IT security professional is when protected data is accessed by unauthorized personnel. While passwords, firewalls and other basic protection methods are becoming easily ‘hackable’, organizations are seen shifting towards Multi-Factor Authentication (MFA), which includes voice callbacks, SMS’s and OTPs, to combat the issue. Although, MFA has been able to minimize the […]
A cyber breach – an incident in which hackers gain access to vital commercial or customer cyber systems – can come with a big price tag for your small business. In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network. Hackers may be motivated […]
Not a day goes by without news and reports around cyber-attacks. High-profile, high-impact cyber breaches are becoming common. IDC’s Health Insights group predicts that 1 in 3 health care recipients will be the victim of a health care data breach in 2016. Healthcare providers (including insurance providers) must encrypt personal information. A cyber breach can […]
Financial industry is driven by data from user details, transactions, account details, payment information, access governance, vendor management and so on. For financial organizations, having a strong plan to defend against cyber-attacks and creating an action based process to deal with a potential attack are crucial. Getting basics in place, and augmenting IT security with […]
Einstein famously defined insanity as “doing the same thing over and over again and expecting different results.” We may relate this saying with redundant and repeated functions/processes that companies continue to follow including archaic security strategies while data breaches or data breaches. There are cases guiding IT security strategists to take a close re-look and […]
While patient management system is an integral part of providing efficient healthcare services, data protection laws make it mandatory to provide reasonable safeguards to protect patient information from inappropriate use or disclosure. With the growing number of apps, along with volumes of data to manage, healthcare providers are swamped with the duel challenge to support […]
Being rich in information, the healthcare industry has become one of the most vulnerable industries. It is being targeted by cyber-criminals as it contains information ranging from an individuals’ personal information credit information to protected health information (PHI) – all in one place. It translates into a high return when such data is viewed in […]
Great experience is a journey, not a destination. Here is a question – If Identity and Access Management (IAM) technology Integration is a Journey, how far have you reached? The same applies to availing benefits from the IAM technology. IAM tech integration is a journey. You cannot stop at one point hoping you have it all […]
If the data resting with a financial organization is breached – for cyber criminals it is like hitting a jackpot! The financial sector is one of the top targets for cyber criminals. Over past few years, banks and financial organizations have been subjected to a barrage of cyberattacks. There are more varied versions and different researches […]
In 2016, we’ve witnessed a number of major IT developments and trends, all of which had a significant effect on defining businesses. Be it evolution in mobile or cloud technologies, or development of newer technologies like IoT and smart devices, several technological expansions made headway into mainstream adoption this year. However, one of the biggest […]
If you have experienced no such activity then you are either lucky or oblivious. In case you have delayed securing your network then you are vulnerable to Cyber Trespassing. From an organisational standpoint, putting in place firewalls and anti-virus is fine, but they do not ensure unfailing security.I am not talking about conventional trespassing, I […]
The demands of business ecosystem have never ceased to increase. This has further increased challenges related to maintenance of secured IT environment across various IT touchpoints. In addition, technological integration should supplement organizations’ fundamental need to operate in a seamless manner. Each aspect of IT and related implementation or integration come with its own set of […]
With a spike in cyber-attacks, financial services firms are leveraging innovative tools for combating this threat. Companies are now looking at improving security programs, using technologies such as Identity and Access Management (IAM), cloud-based cyber-security, Biometrics, Big Data Analytics, Privilege Account Management (PAM), together with advanced authentication. According to a survey, ‘Systemic Risk Barometer’, conducted […]
Typically, IAM solutions bring IT Security intelligence and work-flow operational efficiency. A poorly implemented and integrated IAM system is clearly not optimized for security, identity and access related capabilities. A theft can go unnoticed or detected late, this stands true even for organizations that have well integrated security capabilities in their IT Systems. Organizations that […]
Implementing a user provisioning system may be your key to resolving on- and off-boarding issues and access delays. Identity access and management (IdM) is a broad IT tool used by large firms to manage myriad user identities, compliance, and IT systems. In this entry we will look at IdM access granting in the on- and off-boarding, request […]
Financial sector has evolved into a digitally capable, technologically savvy industry. It has also embraced various breakthroughs in IT Security while maintaining robust workflow based operations. Harnessing mobile technology to better consumer engagement in a secure manner is a revolution we are witnessing in the present times. Banking and financial institutions are reaping the benefits of […]
The financial services market, including the banking sector, is monitored at Federal and State levels, and is subjected to various regulations. There are four main regulatory bodies at Federal level, namely – the Federal Reserve Board, Federal Deposit Insurance Corporation, the Office of Thrift Supervision, and the Office of the Comptroller of the Currency. In addition, […]
Is it time to bid adieu to passwords and say hola to fingerprints? Are we finally moving towards a virtual world where the human body could be the key for accessing physical or virtual systems? Will biometrics sound the death knell on passwords or are we speculating a plot of a sci-fi movie? Is possession-based […]
Telecom companies essentially work with a large user base that spans across national boundaries. The users believe that the telecom system can be relied upon for various transactions that could be financial or sensitive in nature. Within the telecom industry the digital identities created and access governance algorithm is very complex.Let’s look at a scenario.A […]
As per data released by the Identity Theft Resource Center (ITRC), during 2015 (as of December 1, 2015), out of the total data breaches reported, around 35 per cent were from the medical/healthcare industry. Although, the total breaches stood at 717, and medical/healthcare industry saw breaches of 248 during the year, what is worrying is that […]