News

Multi-factor Authentication: Why is a Separate Wearable Device Better Than Your Smartphone?

Multi-factor Authentication: Why is a Separate Wearable Device Better Than Your Smartphone?
In the United States, about 19% of the adult population has experienced identity theft. Over 60 million Americans have had their online identity e...

How to Protect your Gmail Account in 2020. Top Email Security Tips

How to Protect your Gmail Account in 2020. Top Email Security Tips

Gmail is one of the most popular and yet most vulnerable email services. Backed by the largest search engine in the world and with over 1 billion email users and a corresponding amount of payment and confidential information, it attracts many scammers. It inspired us at Hideez to investigate the topic and provide tips on how to secure your Gmail account in 2020.

Passwordless authentication: Reality for 2020?

Passwordless authentication: Reality for 2020?
Passwords suffer a major reputational crisis. Once considered safe and secure, they are now deemed the weak spot in every system. With passwordless authentication, there is no need to use passwords, which could practically eliminate the chances of suffering a security breach. As passwordless authentication is quickly becoming a popular method of securing valuable information, it only remains to be seen how ubiquitous can it grow in 2020 and the years to come. Continue reading to find out everything there is to know about this authentication solution.

Cybersecurity Best Practices for Employees

Cybersecurity Best Practices for Employees
Staff members can fall victim to many different security threats, companies can never be secure enough when it comes to safeguarding their sensitive information. Continue reading to find out the best practices for employees and how to implement them to improve employee cybersecurity awareness going into 2020. 

What is Zero Trust Security? Successful Zero-Trust Implementation

What is Zero Trust Security? Successful Zero-Trust Implementation
Zero Trust architecture has experienced a meteoric rise over the past couple of years, and it became a go-to choice for many organizations looking for a reliable security system. Despite popularity among big and small companies, Zero Trust model remains relatively unknown among average Internet users. 

What is CCPA and How to Become Compliant?

What is CCPA and How to Become Compliant?
The California Consumer Privacy Act, also known as CCPA, becomes effective on January 1, 2020. Its main goal is to secure personal information of individuals by obliging businesses to collect their consent before gathering or processing any sensitive or personal data. According to the broad consensus, the California Consumer Privacy Act will change the way businesses think about user data.

What is HIPAA Compliance? HIPAA Requirements 2020

What is HIPAA Compliance? HIPAA Requirements 2020
HIPAA is a legal act that establishes the rules for patient information protection. It makes it possible for healthcare patients to control their sensitive information and rely on organizations, which are required to implement standardized patient privacy and security structures. But, even though it has been around for quite a while, its rules, requirements, and security standards aren’t something many people are familiar with. Continue reading this page and get all of the information on HIPPA compliance rules, violation penalties, and other important details in the HIPAA checklist.

California Consumer Privacy Act: What is It and How to comply?

California Consumer Privacy Act: What is It and How to comply?

The California Consumer Privacy Act is effective on January 1st, 2020. This means that, in a little less than two months, California will be the first state to introduce a clear-cut and precisely defined privacy law. Intended to enhance privacy rights and consumer protection for the residents of the state of California, the CCPA takes a broad view of what constitutes private data.

What is Phishing? Types and Prevention | Hideez

What is Phishing? Types and Prevention | Hideez

Phishing is an old and tested cyber-security attack that, to this day, remains #1 cause of data breaches worldwide. Anyone can fall victim to a phishing attack, so it's essential to know how to recognize one.

What is Multifactor Authentication? Advantages and Limitations | Hideez

What is Multifactor Authentication? Advantages and Limitations | Hideez

In the world where people seem to remember only passwords like "qwerty", "Abc123!" and "123456789", there should be a way to protect their accounts. Luckily, there is an MFA. Available in many forms, it allows making even the worst of passwords more secure.

What is Identity and Access Management? Advantages and Disadvantages | Hideez

What is Identity and Access Management? Advantages and Disadvantages | Hideez
IAM helps companies ensure secure access of the right individuals to the technical and information resources in the right context. IAM technology sets up the framework for managing digital identities of employees and/or customers.

Who needs to comply with HIPAA? Advantages and Limitations| Hideez

Who needs to comply with HIPAA? Advantages and Limitations| Hideez

Health Insurance Portability and Accountability Act of 1996 (HIPAA) was developed as an industry standard to ensure strong protection of personal healthcare information (PHI). Department of Health and Human Services (HHS) regulates HIPAA compliance, and the Office for Civil Rights (OCR) enforces it.

If you have ever asked yourself, Do I need to be HIPAA compliant? —  you will find the answer below.