Skip to content

Search iam-for-any-industry-health-care

October 18

6 Musts When Selecting an A+ Identity and Access Management Solution

An IAM solution for the education space must have single sign-on, easy user provisioning, self-service options, and more. Check out a2c's offerings for education so you can get a better solution in place before the next semester begins!

Read more
April 25

RSAC 2018 in Review: Highlights, Key Sessions and Emerging Industry Trends

Last week, the RSA Conference 2018 drew 45,000 attendees to San Francisco’s Moscone Center for a week of education on the latest security trends, threats and solutions.

Read more
June 22

MD Anderson Cancer Center Fined $4.3 M for Data Breach

Data Breach Friday: An administrative judge fined The University of Texas MD Anderson Cancer Center $4.3 million Monday. The fine is for violations of the Health Insurance Portability and Accountability Act.

Read more
May 22

The CFO's Business Case For IAM

As the CFO, you are faced with the challenge of justifying technology purchases based on some combination of necessity, functionality, cost savings, benefits, and the overall ROI.

Read more
May 23

The CIO's Business Case For IAM

As the CIO, you must see the big picture when it comes to implementing technology in your organization. It is not good enough to look at how a technology addresses a single issue; the CIO must evaluate how a technology will both positively and negatively impact the entire company.

Read more
May 18

Case Study: The Royal Marsden

a2c’s seamless completion of these challenging and time-consuming tasks allows The Royal Marsden’s dedicated IT staff to focus on other aspects of CMC.

Read more
February 23

Allscripts Ransomware Attack: Lawsuit Already Filed

Data Breach Friday: A week after Allscripts was hit with a ransomware attack that disrupted patient care services of hundreds of its healthcare clients, a class action lawsuit has been filed against the cloud-based electronic health records vendor for allegedly "failing to secure its systems and data from cyberattacks, including ransomware attacks."

Read more
September 13

3 Security Investments Hospitals Should Make Right Now

Health and Human Services chief information security officer Christopher Wlasich said there are three steps that hospitals should be taking today to bolster their security posture: join forces, treat your patching report like your profit-and-loss report and, at the very least, consider multi-factor authentication.

Read more
August 09

Why It Pays to Center Your Digital Transformation Strategy on Identity

Employees and customers must be able to access applications and data from multiple devices and locations, without compromising security.

Read more
September 15

How Much Will the Data Breach Cost Equifax?

Data Breach Friday: The Equifax breach is so massive that the true costs might not be known for weeks, or even months! Can YOU afford all the direct and indirect costs of a data breach? Lock down your customers' or your internal accounts with IAM protection today!

Read more
June 15

This Company Was the Latest to Suffer a Data Breach. Its Reaction Was Perfect

Data Breach Friday: A data breach is never good news, but MyHeritage's response to customers deserves recognition.

Read more
June 07

What You Need to Know About The GDPR: How It May Affect Your Business

The GDPR is a giant leap forward for online rights. Not only is it about keeping individual data safe and secure, but it’s about firms and companies taking responsibility for their hand in possible data leaks.

Read more
July 26

Hackers Love Companies That Don't Use Multi-Factor Authentication

It’s remarkable just how many significant security breaches could have been prevented if only multi-factor authentication technology had been deployed.

Read more
September 29

Deloitte Suffers Major Data Breach Without Multi-Factor Authentication

Data Breach Friday: Hackers gained access to a Deloitte admin account that did not have 2-Factor Authentication enabled! For months they had access to usernames, passwords, client emails, and more!

Read more
October 11

What Is IDaaS, and Why Does Your Mobile Strategy Need It?

Incorporating Identity-as-a-Service in your BYOD plan can enforce password policies, implement control over remote access of your systems, and introduce context-aware security techniques for improved detection of unauthorized activity. Let a2c be your provider!

Read more
November 13

Privileged Account Management Remains Problematic

A new survey finds that 86% of security pros do not consistently change privileged account passwords, and 40% of respondents don't change default admin passwords! A proper IAM solution like Authen2cate's is essential to safeguarding these critical accounts.

Read more
August 17

Most Small to Mid-Sized Organizations Don't Use Multi-Factor Authentication

While only 38 percent of large organizations don't use multi-factor authentication to protect user accounts, 62 percent of small to mid-sized organizations do not use MFA, a recent KnowBe4 survey of 2,600 IT professionals found.

Read more
April 06

Card Data Stolen From 5 Million Saks and Lord & Taylor Customers

Data Breach Friday: Saks has been hacked — adding to the already formidable challenges faced by the luxury retailer. A well-known ring of cybercriminals has obtained more than five million credit and debit card numbers from customers of Saks Fifth Avenue and Lord & Taylor, according to a cybersecurity research firm that specializes in tracking stolen financial data.

Read more
November 22

How To Give Your Parents The Security Talk This Thanksgiving

Explaining why you shouldn't use the same password for every account can be difficult. Here's some help.

Read more
March 14

Who Owns Identity and Access Management?

This editorial looks to solve the issue of security being seen as a roadblock to getting things done. If security is an inconvenience, people will circumvent it and it protects no one!

Read more
May 17

Five Critical Layers of Protection to Ensure Data Security

With businesses holding more data than ever before, the frequency of cyber breaches grows exponentially. A recent survey showed that there were over 1,792 reported data breaches in 2016 alone. The breaches compromised almost 1.4 billion data records.

Read more
May 19

Single Sign-On

authen2cate provides a secure, scalable, and highly available IAM (Identity and Access Management) platform that allows any organization to quickly and securely implement SSO, 2-Factor Authentication, and Automated Provisioning.

Read more
December 21

Cybersecurity and Privacy Predictions for 2018

The past year in cybersecurity has been one of combating ransomware extortion attacks, bracing systems against DDoS attacks and securing internet of things (IoT) systems. Looking to next year, cybersecurity experts at McAfee Labs laid out their predictions for the industry's top concerns in 2018.

Read more
January 17

Why is Multi-Factor Authentication so Important?

A password isn’t enough for modern day security – it’s time to layer up.

Read more
March 02

Key Lessons Learned from Data Breaches Caused by Privilege Abuse

Data Breach Friday: Privileged account abuse tops the list of the most dangerous threat patterns. It is relatively easy for insiders to steal sensitive data, but it can take organizations months or even years to detect and investigate such incidents.

Read more
May 22

Securing Identity In K-12 Education

Authen2cate solves for challenges like large user bases, too many passwords, many mobile devices and increasing security costs with our K-12 solutions.

Read more
December 13

Top Cybersecurity Risks in Education

In this blog post, we'll highlight the main concerns of educational organizations worldwide using feedback gathered from IT specialists working for educational institutions. authen2cate works with higher education customers to help them with identity management strategy and implementation.

Read more
May 03

Protect yourself on World Password Day by using authen2cate

On May 3rd, we join the rest of the world in recognizing World Password Day. World Password Day takes place on the first Thursday of May each year and serves as a day to revisit and reflect on our password and cyber security habits. Learn how authen2cate (A2C) can protect you all year long – not just for one day.

Read more
March 01

Top Five Ways to Improve Your Company’s Password Security

While the password may seem archaic, it still acts as the first line of defence against hackers. We outline five ways companies can improve their password hygiene to better protect themselves in an increasingly hostile digital world.

Read more
May 09

Breaches Drive Consumer Stress over Cybersecurity

As major data breaches make headlines, consumers are increasingly worried about cyberattacks, password management, and data security. Let authen2cate ease your worries with our IAM solutions!

Read more
November 30

5 Ways Users Circumvent Security Measures and How to Prevent It

Workers usually choose convenience over security, especially if you force them to jump through too many hoops. But there are steps you can take to shift the balance back in security's favor.

Read more
January 29

Data Privacy is for Life, Not Just for a Day

Data Privacy Day is observed on January 28th each year. As well as being an awareness day, it also commemorates the January 28 1981 signing of Convention 108; the first legally binding international treaty dealing with privacy and data protection. So, in line with this international holiday and the greater ‘stay safe online’ movement, here’s our top tips on how to keep your SME safe from cyber criminals.

Read more
August 01

Hackers Show Proofs of Concept to Beat Hardware-Based 2FA

DEF CON hackers show how YubiKeys and RSA tokens can be spoofed and circumvented.

Read more
February 09

The Cost of a Data Breach in 2018

Data Breach Friday: 58 data records are stolen every second at an average cost of $141 each. Trading in intellectual property and personal data is so widespread that someone invented a calculator that can estimate the potential harm to your own business.

Read more
November 01

IoT Security Fail: Hacked Vacuum Cleaner Becomes Spy Cam

After bypassing many of the LG Hom-Bot vacuum's security features, researchers were able to simply change their usernames to gain access to the device's camera and live-stream video! IAM and IoT must go hand-in-hand!

Read more
August 03

HBO Data Breach Included Thousands of Internal Documents

Data Breach Friday: Hackers stole 1.5 TB of documents and unaired episodes from HBO, and also got hold of an executive's credentials for some online services! Hopefully HBO will require password changes and 2-Factor Authentication where possible...

Read more
May 21

Case Study: LRW

“LRW needed to integrate applications not included by many self-service SSO providers. Additionally, they did not have the necessary resources, expertise, or experience to implement this complex setup on their own.”

Read more
May 15

Case Study: Harcum College

The IT staff wasn't burdened by SSO implementation or ongoing maintenance, allowing them to spend their time and resources on Harcum’s other systems to help students reach their full academic potential.

Read more
May 16

Directory Services

authen2cate provides a number of directory-related services to meet our clients’ needs. We can act as the primary directory in the cloud for all your enabled applications or leverage your internal directory (LDAP or AD) as the primary source for user identities.

Read more
June 28

Anthem to Pay Record $115 Million to Settle U.S. Lawsuits over Data Breach

Data Breach Friday: Remember the Anthem data breach that affected 79 million people in 2015? A tentative settlement of $115 million has been reached--the largest settlement for a data breach ever! Still think better Identity & Access Management isn't worth it?

Read more
July 05

Millennial Versus Mature – Who's the Real IT Security Risk?

Passwords have been the mainstay for securing applications, devices and the data they hold, pretty much ever since IT was invented. It’s an approach that has always had weaknesses though, mostly because few of us can keep long, complex codes safely in our heads.

Read more
May 25

T-Mobile Data Breach Shows Importance of Securing Internal Tools

Data Breach Friday: A flaw in T-Mobile's website allowing anyone to access customer data highlights the need for internal audits and authentication.

Read more
July 27

Swedish Ministers Resign Amid Data Security Breach Scandal

Data Breach Friday: Swedish citizens’ sensitive personal information may have been leaked in a breach so severe that two government ministers have resigned!

Read more
February 16

Uber Data Breach Aided by Lack of Multi-Factor Authentication

Data Breach Friday: For Uber CISO John Flynn, having to explain the company’s massive 2016 data breach to a senate hearing was never going to be an easy day out.

Read more
June 27

UK Parliament Cyberattack Highlights the Shortcomings of Passwords

Over the weekend, the UK parliament's email system was subject to a brute force attack using passwords stolen in the 2012 LinkedIn breach.

Read more
June 14

5 Key Areas Where You Need Multi-Factor Authentication Now

From cloud applications to digital workspaces—and everywhere in between—your organization has more points of access vulnerability than ever. Learn how multi-factor authentication can make access more secure in five key areas, without making it more difficult for legitimate users.

Read more
June 21

Strengthen Cloud App Security with Multi-Factor Authentication

It’s a fact: Many cloud applications rely primarily on a username/password combination for secure access. That may be music to a hacker’s ears, but it’s not what IT security teams want to hear.

Read more
July 20

Lack of Multi-Factor Authentication Compromises Data of 21 Million Timehop Users

Data Breach Friday: Timehop, a social networking app that lets people reminisce the good ol' days by gathering and linking old posts from its users' social media accounts, suffered a stunning data breach recently that compromised names, email addresses, and phone numbers of up to 21 million users.

Read more
May 14

Multi-Factor Authentication

Multi-Factor Authentication enables your users to secure their logins and transactions via text, email, smartphone application, or phone calls.

Read more
April 19

Malware Attack on Vendor to Blame for Delta and Sears Data Breach Affecting ‘Hundreds of Thousands’ of Customers

Data Breach Friday: Delta Air Lines and Sears Holding Corp. disclosed a data breach that may have exposed the payment card details of hundreds of thousands of online customers.

Read more
June 29

Time for Another MASSIVE Data Breach – Nearly All Adult Americans’ Personal Data Exposed by a Data Mining Firm

Data Breach Friday: Still recovering from the Equifax data breach? Not sure how some company that you had never heard about before was keeping a check on your finances? Well, you have more worries to add to that list of questions because there is another company storing data on hundreds of millions of Americans, and storing it on a publicly accessible server…

Read more
February 06

A Safer Internet Needs Smarter Fraud Defence

Safer Internet Day is upon us on February 6. Although the national day is run for the benefit of young digital natives, aiming to promote the safe and positive use of digital technology, it’s a good marker for people of all ages to consider how they stay safe online.

Read more
December 07

Hackable Holidays: Dangers of Toys That Spy on Kids

Smart toys that connect to the internet are at the top of kids’ wish lists this year, but experts say the toys can be used to spy on them and expose children to predators.

Read more
May 31

Keep Your Data Secure with a Layered Approach

You need to understand the advantages to a multilayered approach in order to deploy an effective data security program.

Read more