Best practices for tracking access to IT systems

Osterman Research recently surveyed knowledge workers about their access to former employers’ IT systems. An incredible 89% of respondents retained access to at least one system—such as Salesforce, PayPal, email, SharePoint and other sensitive corporate apps. Key Osterman Research recommendations include implementing best practices for managing employee access to IT services as well as a rigorous IT offboarding process for …

New two-factor authentication features for Ascend AppID help improve security

Password hacks have become so frequent nowadays, you’re probably sick of constant reminders to update your passwords. I mean, how many passwords can you be expected to remember? Even with the strongest of passwords, there are no guarantees. Hackers know much more about passwords than they used to. What once might have taken a few years to crack, now may take …

Osterman Research shares why your ex-employees could be your next big security threat

What happens when an employee leaves your company? If you’re like many small and medium-sized businesses, you’ll collect their laptops and IDs and then quickly work towards filling the newly vacant position. But if you’re not thinking about the IT access they’re bringing with them, then your company is at risk. We sat down with Michael Osterman of Osterman Research …

Optimizing and troubleshooting Outlook for Mac OS X

I’m a Mac user. And Outlook for Mac makes me sad. That’s because, when compared to its Windows counterpart, Outlook for OS X (aka Outlook 2011) is an underperformer. Maybe it’s because the Windows version was built in the same shop as the Exchange service. Or maybe Microsoft has an understandable bias to Windows. Regardless, us Apple lovers pay the …

What healthcare companies can learn from Anthem’s data breach

If you’ve followed the news behind Sony, JP Morgan and other highly publicized breaches, you’ll notice that this latest Anthem breach follows a very familiar trend. Corporate IT systems are fighting a losing battle against today’s hackers. Unfortunately, when it comes to data breaches and cyberattacks, healthcare organizations are a prime target. Why healthcare systems? A few reasons: (1) many …