How Identity and Access Management (IAM) helps meet cyber security insurance requirements

We’re still in January and at least four (4) significant cyber-attacks have made the media circuits. T-Mobile, Yum! Brands, LastPass, and ODIN have all succumbed to breaches leaking millions of user identifies, personally identifying information (PII), and other confidential data. These brands may be able to recover quickly from cyber incidents, but for a small… Continue reading How Identity and Access Management (IAM) helps meet cyber security insurance requirements

Farewell basic authentication

Starting on October 1st, 2022, Microsoft will be removing the ability to connect into Office 365 using legacy authentication methods. This affects the native mail application on both iPhone and Android, as well as several other connection methods like printers, scanners, and line-of-business applications. Some folks aren’t comfortable with change, but this is a very… Continue reading Farewell basic authentication