Hideez Blog | Secure Identity Management, Best practices & Tips

Passwordless authentication: Reality for 2020?

Passwordless authentication: Reality for 2020?
Passwords suffer a major reputational crisis. Once considered safe and secure, they are now deemed the weak spot in every system. With passwordless authentication, there is no need to use passwords, which could practically eliminate the chances of suffering a security breach. As passwordless authentication is quickly becoming a popular method of securing valuable information, it only remains to be seen how ubiquitous can it grow in 2020 and the years to come. Continue reading to find out everything there is to know about this authentication solution.

Cybersecurity Best Practices for Employees

Cybersecurity Best Practices for Employees
Staff members can fall victim to many different security threats, companies can never be secure enough when it comes to safeguarding their sensitive information. Continue reading to find out the best practices for employees and how to implement them to improve employee cybersecurity awareness going into 2020. 

What is Zero Trust Security? Successful Zero Trust Implementation

What is Zero Trust Security? Successful Zero Trust Implementation
Zero Trust architecture has experienced a meteoric rise over the past couple of years, and it became a go-to choice for many organizations looking for a reliable security system. Despite popularity among big and small companies, Zero Trust model remains relatively unknown among average Internet users. 

What is CCPA and How to Become Compliant?

What is CCPA and How to Become Compliant?
The California Consumer Privacy Act, also known as CCPA, becomes effective on January 1, 2020. Its main goal is to secure personal information of individuals by obliging businesses to collect their consent before gathering or processing any sensitive or personal data. According to the broad consensus, the California Consumer Privacy Act will change the way businesses think about user data.

What is HIPAA Compliance? HIPAA Requirements 2020

What is HIPAA Compliance? HIPAA Requirements 2020
HIPAA is a legal act that establishes the rules for patient information protection. It makes it possible for healthcare patients to control their sensitive information and rely on organizations, which are required to implement standardized patient privacy and security structures. But, even though it has been around for quite a while, its rules, requirements, and security standards aren’t something many people are familiar with. Continue reading this page and get all of the information on HIPAA compliance rules, violation penalties, and other important details in the HIPAA checklist.

California Consumer Privacy Act 2020 | What You Need to Know?

California Consumer Privacy Act

The California Consumer Privacy Act is effective on January 1st, 2020. This means that, in a little less than two months, California will be the first state to introduce a clear-cut and precisely defined privacy law. Intended to enhance privacy rights and consumer protection for the residents of the state of California, the CCPA takes a broad view of what constitutes private data.

What is Phishing? Types and Prevention | Hideez

What is Phishing? Types and Prevention | Hideez

Phishing is an old and tested cyber-security attack that, to this day, remains #1 cause of data breaches worldwide. Anyone can fall victim to a phishing attack, so it's essential to know how to recognize one.

What is Multifactor Authentication? Advantages & Limitations

What is Multifactor Authentication? Advantages & Limitations

In the world where people seem to remember only passwords like "qwerty", "Abc123!" and "123456789", there should be a way to protect their accounts. Luckily, there is an MFA. Available in many forms, it allows making even the worst of passwords more secure.

What is Identity and Access Management? Advantages & Disadvantages

What is Identity and Access Management? Advantages & Disadvantages
IAM helps companies ensure secure access of the right individuals to the technical and information resources in the right context. IAM technology sets up the framework for managing digital identities of employees and/or customers.

Who needs to comply with HIPAA? Advantages & Limitations

Who needs to comply with HIPAA? Advantages & Limitations

Health Insurance Portability and Accountability Act of 1996 (HIPAA) was developed as an industry standard to ensure strong protection of personal healthcare information (PHI). Department of Health and Human Services (HHS) regulates HIPAA compliance, and the Office for Civil Rights (OCR) enforces it.

If you have ever asked yourself, Do I need to be HIPAA compliant? —  you will find the answer below.

Data Privacy & Security in Healthcare. Who needs to Comply with HIPAA?

data protection in healthcare hippa
The Health Insurance Portability and Accountability Act (HIPAA) is one of the key documents for every CISO working in healthcare. Written over 20 years ago, long before smartphones, WiFI or Google were invented, it still regulates healthcare information security in the industry. Learn how it is applied nowadays to ensure secure medical care.

Authentication in NIST Cybersecurity Framework | Smart Grid Profile for Improving Critical Infrasrtucture

NIST Cybersecurity Framework
The U.S. electric power grid is modernizing through “smart” technologies. These changes bring a lot of benefits, but also a lot of potential cybers...