Tag - Identity & Access

What Are The Advantages of Implementing Conditional Access?

It seems that nearly as long as passwords have been around, they’ve been a major source of security concern. Eighty-one percent of security incidents happen due to stolen or weak passwords. Additionally, employees continue to neglect the basics of good cyber hygiene. For example, 61% of workers use the same password for multiple platforms. And 43%...

Checklist for Better Digital Offboarding of Employees

Digital footprints cover today's modern workplace. Employees begin making these the moment they're hired. They get a company email address and application logins. They may even update their LinkedIn page to connect to your company. When an employee leaves a company, there is a process that needs to happen. This is the process of “decoupling” the...

MFA Security Updates

In case you missed our recent email notification, as a part of our continually improvement across our clients we will be rolling out some additional security enhancements aimed at tightening security. Remember, security is a shared responsibility and if your business has never undertaken MFA improvements, had a Business Technology Review, or a Vulnerability Assessment, then...