As technology evolves, we’re often faced with misconceptions around how it works and how we can use it. Whether it’s that Apple computers are immune to viruses or that private browsing keeps user activity anonymous, there are a number of security myths that surround our technology—and change how we use and protect it. This trend applies to both personal and business contexts. Within the enterprise, decision makers are often swayed by common misunderstandings around securing corporate resources. For instance, despite the hype around cloud computing, 98% of enterprises still rely on on-prem systems and servers. In part, this is because they believe that the cloud presents more of a security risk than their on-prem systems—but that’s simply not true. Three myths that get in the way of on-prem security In my previous post, I discussed how Okta Access Gateway enhances organizational security. Now, I’ll explore three on-prem security myths that.