For today’s businesses, digital transformation has become a core driver of success. And for IT administrators, there’s significant pressure to ensure that their organization is leveraging the right digital tools to deliver its own applications and services. As an Okta Solutions Engineer, I've worked with many customers on technology solutions, and…
A recent report from the Anti-Phishing Working Group (APWG) revealed phishing attacks for the first quarter of 2022 exceeded one million—the highest on APWG record. As attacks increase, it’s reasonable to expect targeted phishing attacks to increase as well.
The U.S. government is defending itself against this growing threat via mandates and…
IT infrastructure consists of all the core tech components that organizations need to get work done. While hardware, software, and networks are all widely acknowledged as the backbone of IT infrastructure, new technology trends are changing the ways we work and connect.
Cloud, identity, digital transformation, and distributed working models have…
You’ve just adopted a new service! Great! But no one is using it. Why not? It appears that no one has access to the application, so no one wants to create a new account with a new set of credentials. Even worse, the team who created the system failed to port over all the users. Would you want to use such a system?
This scenario may sound odd, but…
Provisioning is the process of making information technology (IT) systems available to users. Depending on your organization’s needs, provisioning can be defined at the network, server, application, and user level:
Network provisioning involves setting up a network that can be accessed by users, servers, and devices. The telecommunications…
Biometric authentication is a security process that compares a person’s characteristics to a stored set of biometric data in order to grant access to buildings, applications, systems, and more. With cybercrime, fraud, and identity theft on the rise, it’s more important than ever for businesses to help customers and employees verify their identity,…
A password manager is an application that stores and manages online credentials—think of it as a type of vault that keeps passwords safe. In addition, password managers make it easier to access apps and websites since they can automatically input login details.
Everyone who uses a computer or smartphone is likely familiar with switching between…
As the great Mark Twain once wrote in response to reading his own obituary in May of 1897, “reports of my death have been greatly exaggerated.” Fast forward nearly a hundred years to 1995, and a Finnish computer scientist named Tatu Ylönen created a secure transport protocol known simply as Secure Shell (SSH). What do these things have to do with…
The entrepreneurial journey is often portrayed by the media as a glamorous transition from founding to funding to IPO. In movies and on TV, startups are buzzing innovation hubs with ping pong tables and kombucha on tap. Either that, or a company goes up in smoke, and then is profiled in a ruthless documentary series. But as every entrepreneur —…
It’s no secret that we’re experiencing a dramatic shift in the way we conduct business, the way we manage our workforce, and the way we interact with our customers. As companies worldwide respond to the unprecedented effects of COVID-19, we’ve seen these changes play out in how organizations accommodate both their employees and their customers…