What is Phishing?

In today’s increasingly digital environment, employees and contractors can sign into workplace applications and systems from anywhere with a simple set of credentials. And while this might make things easier for employees and contractors alike, it also puts organizations at heightened risk of a specific form of cybercrime: phishing. Designed to…

Data Privacy Day: 5 Tips to Help Keep your Private Data Private

As new technologies continually integrate themselves deeper into the lives of average consumers, these users increasingly benefit from the enhanced productivity and convenience that these technologies offer. That being said, knowing how to leverage these technologies in a way that optimizes personal privacy isn’t always intuitive for the average…

Businesses @ Work 2020: New Decade, New Apps, and New Ways to Work

Today, we announced the findings of our sixth annual Businesses @ Work report, exploring how organizations and people work today. Businesses @ Work paints one of the clearest pictures of how organizations evolve when it comes to technology, and the trend line clearly points to greater adoption across the board; over the past six years, we’ve seen…

Enabling Our Customers’ Success Is at the Core of Everything We Do

There’s no instruction manual for digital transformation. Modern organizations know that to streamline operations, defend data, and secure customer applications, moving to a cloud-based IT infrastructure supported by strong identity and access management (IAM) is critical. But where does this journey begin? What does it entail? When does it end?…

Rethinking AD: The Four Stages of Separation, Part 1

In the first blog of this series, we explained why it’s time to break-up with Active Directory (AD). In the second, we listed the top five things you can look forward to after making the change. So now we’re breaking down the four stages of separation you’re going to experience as you reduce your dependency on, and potentially leave, Active…

3 On-Prem Security Myths Debunked

As technology evolves, we’re often faced with misconceptions around how it works and how we can use it. Whether it’s that Apple computers are immune to viruses or that private browsing keeps user activity anonymous, there are a number of security myths that surround our technology—and change how we use and protect it. This trend applies to both…

4 ways Okta Access Gateway boosts security for on-prem resources

In 2019, we made the exciting announcement that Okta Access Gateway (OAG) is available to all of our customers. In that post, we described how Access Gateway helps businesses implement modern access management solutions like single sign-on (SSO) and adaptive multi-factor authentication (MFA) across their on-premises applications. The result is…

How Software Licensing Costs Are Eating Your Budget

Have you ever stumbled on a great airline deal only to find out there's an additional cost for checked luggage? Or signed up for a credit card offer with amazing perks, only to get stung by a higher-than-normal annual fee? You're not alone. It’s these experiences that remind us that if something sounds too good to be true, it probably is. …

AI Is Changing Security—Here’s How

Cybercriminals have evolved from lone hackers targeting small websites and systems into dangerous entities launching large-scale cyberattacks that affect millions of people worldwide. In recent years, we’ve seen multiple huge ransomware attacks like WannaCry and NotPetya cause hudereds of millions or even billions of dollars in damages and lost…

Archive

Follow Us