System News
 1 2 3 4 5 6 7 8 9 10 11 next
Articles for the keywords: Identity Management
27 Aug 2017 50% Of Ex-Employees Can Still Access Corporate Apps [65745]
Dark Reading, August 18th, 2017

"When employees are terminated or move on to new roles, they're often taking access to corporate data with them. For some companies, this access leads to a data breach," notes Kelly Sheridan in Dark Reading.

"Researchers at identity management firm OneLogin polled 500 IT decision makers to learn about how they provision and deprovision, or terminate, staff login information in-house. Results indicate most aren't doing enough to protect against the threat of ex-employees.

Twenty percent of respondents report their failure to deprovision employees from corporate applications has contributed to a data breach at their organization. Of those, 47% say more than 10% of all data breaches have been the result of ex-employees..."
(Get More Information . .) open to premium members only

22 Aug 2017 Ex-Employees Still Cause Data Breaches (Slideshow) [65838]
CIO Insight, August 22nd, 2017

"Many ex-employees continue to have access to corporate applications and often contribute to data breaches, says a new study. Forty-eight percent of respondents in the study, "Curse of the Ex-Employees," are aware of the problem. Furthermore, 20 percent of respondents believe the failure to deprovision employees has contributed to a data breach at their organization. "Companies aren't following very basic but essential security measures around employee provisioning and deprovisioning," said Alvaro Hoyos, chief information security officer at identity management provider OneLogin, which commissioned the study..."
(Get More Information . .) open to premium members only

18 Aug 2017 50% Of Ex-Employees Can Still Access Corporate Apps [65599]
Dark Reading, August 18th, 2017

"When employees are terminated or move on to new roles, they're often taking access to corporate data with them. For some companies, this access leads to a data breach.

Researchers at identity management firm OneLogin polled 500 IT decision makers to learn about how they provision and deprovision, or terminate, staff login information in-house. Results indicate most aren't doing enough to protect against the threat of ex-employees.

Twenty percent of respondents report their failure to deprovision employees from corporate applications has contributed to a data breach at their organization. Of those, 47% say more than 10% of all data breaches have been the result of ex-employees..."
(Get More Information . .) open to premium members only

14 Aug 2017 The ABCs Of Identity Management [65657]
Networks Asia, August 14th, 2017

"What is identity management? Broadly speaking, identity management systems (also known as identity and access management, or IAM, systems) enable the administration of individual identities within a system, such as a company, a network or even a country. More specifically, ID management in enterprise IT is about defining and managing the roles and access privileges of individual network users and the circumstances in which users are granted (or denied) those privileges.

An ID management system's core objective is one identity per individual. Once that digital ID has been established, it must be maintained, modified and monitored throughout each user's 'access lifecycle'..."
(Get More Information . .) open to premium members only

09 Aug 2017 The ABCs of Identity Management [65494]
CSO Online, August 9th, 2017

"Identity management tools provide IT managers with tools and technologies for controlling user access to critical information within an organization...

What is identity management? Broadly speaking, identity management systems (also known as identity and access management, or IAM, systems) enable the administration of individual identities within a system, such as a company, a network or even a country. More specifically, ID management in enterprise IT is about defining and managing the roles and access privileges of individual network users and the circumstances in which users are granted (or denied) those privileges..."
(Get More Information . .) open to premium members only

 
 1 2 3 4 5 6 7 8 9 10 11 next






!-- end archive_section.tpl -->