16 of the World's Biggest Data Breaches & Hacks of 2016

 While looking forward to 2017, it is also time to take stock of last year. What follows is a list of the 15 biggest data breaches by record count for 2016. We compile this list every year, and just by sheer record count, 2016 blew previous years away (thank you Yahoo!), and is an eye watering compilation of sensitive information and credential theft.

3 things to expect in 2017

2017 image.jpeg “Change is the only constant in life.”

The words Greek philosopher Heraclitus once said could not be any truer than in today’s world.

As we get close to the end of the year, it is a good time to reflect on what has been accomplished over the last 12 months and what we face in the year to come. Below are 3 things to expect in 2017:

 

 

2016 #CustomerLove Roundup

customerlove.jpgSince we consider ourselves partners in identity and access management to our customers, we’re always thrilled to see their successes and announcements in the news. We have a lot of respect for the ways they’re making strides in their industries and pushing the envelope to create elegant solutions to the most complex problems. Here are some of our favorite highlights from 2016:

 

 

 

Celebrating Computer Security Day

worldsecurityday2 (1).jpgToday is Computer Security Day. From smartphones to the ever expanding world of IoT, so much of daily life now depends upon or is directly impacted by a multitude of computer. As a result, there’s it’s in everyone’s best interest protect all of our connected devices, not just laptop or desktop computers. In the spirit of World Computer Security Day, , we’ve pulled together a few pieces of information and suggestions to help improve your and also the world’s computer security.

 

 

Giving Back for #GivingTuesday

GivingTuesday11.29.2016.pngAs a company, we practice gratitude every Friday. Our sales team takes that concept up a notch and is grateful every morning in their daily standup. We work a block away from the beach in sunny Southern California and are lucky to work in a team-working environment. We’re grateful for so many things, that we’re driven to give back.

Secure Authentication and Authorization: A Gateway to Selling to the Enterprise


base-devices@2x-2.pngIn today’s world of fast-paced app development, growing business-to-business (B2B) application services are looking to quickly add midmarket and enterprise clients to their customer base. While these potential enterprise customers seek to adopt SaaS tools to increase productivity, trust in app security is a prerequisite. Success in the crowded B2B app marketplace has been shown to rely heavily on a given app’s ability to establish secure connections to existing identity providers. For this reason alone, CTOs are willing to invest highly valuable time and development resources in building out authentication and authorization capabilities, pulling technical focus away from core app functionality.

Focusing on the Journey, Not the Destination: Maximizing Existing Security Investments

journey.jpegA well functioning and capable security program requires a blend of tools and solutions. Organizations typically make purchases based upon their immediate needs (or maybe those they had 12 months ago when the thought first crossed someone’s mind), and then hopefully implement said purchases. Buying and implementing though is just a portion of the lifecycle of those tools. What’s often forgotten along with things like daily care and feeding, is to periodically reassess that investment.

The Cow and The Ditch: What To Do After A Data Breach

planning.jpgWhile the proper thing is to focus on avoiding data breaches and security incidents before they even happen, unfortunately they still do. According to the Identity Theft Resource Center, there have been nearly 800 data breaches over the course of the year so far with nearly 30 million records exposed. Many of these were the result of basic employee error, but some have been much more sophisticated. While you might not anticipate a breach, you should at least plan for one.

Passwords. The Pros, The Cons, The Alternatives.

Password SecurityEnter your username and password. The format has been around for ages, and is so commonplace now that password fatigue is a real thing. The end result is that the same username and password combination -- maybe variations on the same theme because that seemed enough at the time -- are repeated and propagated across different sites and applications for years. The risk associated with sticking to that habit has grown immensely with the ever-increasing number of data breaches and now, more than ever, the approach to passwords has to change.

The Hidden Value of Exceptional Customer Service

5-star_service.jpgInternational Customer Service Week marked an important opportunity for us to revisit what makes us a customer-driven organization. Our alignment comes primarily from each department focusing on their unique ability to positively impact our customers’ experience while using our identity platform. Our CRO has discussed how to build Customer Service into your company’s DNA, our proactive support has been called out as a top way to upgrade your CS and our CTO has offered insight on how to keep your customers in mind even as you code. Why? We strongly believe outstanding support not only adds value to our customers’ experience of using our product, but that it’s actually an integral part of our offering.

It's the Opportunity End-of-Year Presents

end-of-year.jpg

September 30th marks the end of the U.S. government’s fiscal year. No, it’s not a holiday or generally-recognized cause for celebration, but I’d like to offer an exciting twist: end-of-year is the perfect time to make sure you’re getting the most out of your cloud investment.

Increasing Productivity for the Modern Workforce

modern_workforce.jpgGone are the days when IT was responsible for only a small set of apps which employees had to use. Today’s modern workforce expects to have access to any cloud app that increases their productivity while having the flexibility to use it from any device or location. The longer IT teams take to come up with a solution to this changing workforce expectation, the greater the rise of Shadow IT, which poses a risk to security and compliance of company and customer data. With Bitium, IT not only empowers today’s workforce and increases productivity, it also enables organizations to meet their security and compliance needs.

Bitium Drives Faster Adoption of Office 365

Office-365-New.jpg

When organizations start moving to the cloud, Office 365 is often the first app to be considered. Rolling out O365 can be complicated, which increases adoption time and resistance within the organization. With Bitium, organizations can easily configure WS Trust for O365 and connect through SAML for token-based authentication. Bitium reduces the friction of provisioning access, while extending existing security policies. For successful adoption, manage access to O365 with Bitium. 

{{cta('7dd94aee-86e5-4e77-8c05-71d37452f353','justifycenter')}}

On the Eve of System Administrator Day

city_scape_2.pngSystem Administration is a juggling act. Influxes of new hires, the trickle of departing team members, and a constantly fluctuating security landscape add endless complexity to a sysadmin’s daily workload. Each day is not like the last with surprises around every turn.