A study conducted by Intermedia last year found that the average employee relies on 13 different web applications at work, each requiring a different password. It also found that 89 percent of working adults retained access (i.e., a valid login and password) to at least one application from a former employer. More concerning, 45 percent retained access to "confidential" or "highly confidential" data, and 49 percent logged into an account after leaving the company.
With these realities in mind, identity and access management (IAM) software is increasingly necessary for businesses of every size to combat potential data breaches to data and IT systems. IAM is not only about single sign-on (SSO): A range of new and advanced capabilities greatly increase security while improving employees' productivity. In this slideshow, Intermedia highlights the top five features business should look for in an IAM solution.
When phone calls, video conference information, pictures, chat logs, etc. are all stored in a central location via social media, a potential hacker has access to just about everything, quickly and easily. ... More >>
Unearth the real story behind five commonly held myths about distributed denial-of-service attacks. ... More >>
IT security ultimately depends on making sure employees use the appropriate tools and comply with policies designed to protect them and their data/applications. ... More >>