Hideez Blog | Identity Management News, Best practices & Tips

What is Zero Trust Security? Successful Zero Trust Implementation

What is Zero Trust Security? Successful Zero Trust Implementation
Zero Trust architecture has experienced a meteoric rise over the past couple of years, and it became a go-to choice for many organizations looking for a reliable security system. Despite popularity among big and small companies, Zero Trust model remains relatively unknown among average Internet users. 

What is CCPA and How to Become Compliant?

What is CCPA and How to Become Compliant?
The California Consumer Privacy Act, also known as CCPA, becomes effective on January 1, 2020. Its main goal is to secure personal information of individuals by obliging businesses to collect their consent before gathering or processing any sensitive or personal data. According to the broad consensus, the California Consumer Privacy Act will change the way businesses think about user data.

What is HIPAA Compliance? HIPAA Requirements 2020

What is HIPAA Compliance? HIPAA Requirements 2020
HIPAA is a legal act that establishes the rules for patient information protection. It makes it possible for healthcare patients to control their sensitive information and rely on organizations, which are required to implement standardized patient privacy and security structures. But, even though it has been around for quite a while, its rules, requirements, and security standards aren’t something many people are familiar with. Continue reading this page and get all of the information on HIPAA compliance rules, violation penalties, and other important details in the HIPAA checklist.

California Consumer Privacy Act 2020 | What You Need to Know?

California Consumer Privacy Act

The California Consumer Privacy Act is effective on January 1st, 2020. This means that, in a little less than two months, California will be the first state to introduce a clear-cut and precisely defined privacy law. Intended to enhance privacy rights and consumer protection for the residents of the state of California, the CCPA takes a broad view of what constitutes private data.

What is Phishing? Types and Prevention | Hideez

What is Phishing? Types and Prevention | Hideez

Phishing is an old and tested cyber-security attack that, to this day, remains #1 cause of data breaches worldwide. Anyone can fall victim to a phishing attack, so it's essential to know how to recognize one.

What is Multi-factor Authentication? Advantages & Limitations

What is Multi-factor Authentication? Advantages & Limitations

In the world where people seem to remember only passwords like "qwerty", "Abc123!" and "123456789", there should be a way to protect their accounts. Luckily, there is an MFA. Available in many forms, it allows making even the worst of passwords more secure.

What is Identity and Access Management? Advantages & Disadvantages

What is Identity and Access Management? Advantages & Disadvantages
IAM helps companies ensure secure access of the right individuals to the technical and information resources in the right context. IAM technology sets up the framework for managing digital identities of employees and/or customers.

Who needs to comply with HIPAA? Advantages & Limitations

Who needs to comply with HIPAA? Advantages & Limitations

Health Insurance Portability and Accountability Act of 1996 (HIPAA) was developed as an industry standard to ensure strong protection of personal healthcare information (PHI). Department of Health and Human Services (HHS) regulates HIPAA compliance, and the Office for Civil Rights (OCR) enforces it.

If you have ever asked yourself, Do I need to be HIPAA compliant? —  you will find the answer below.

Data Privacy & Security in Healthcare. Who needs to Comply with HIPAA?

data protection in healthcare hippa
The Health Insurance Portability and Accountability Act (HIPAA) is one of the key documents for every CISO working in healthcare. Written over 20 years ago, long before smartphones, WiFI or Google were invented, it still regulates healthcare information security in the industry. Learn how it is applied nowadays to ensure secure medical care.

Authentication in NIST Cybersecurity Framework | Smart Grid Profile for Improving Critical Infrasrtucture

NIST Cybersecurity Framework
The U.S. electric power grid is modernizing through “smart” technologies. These changes bring a lot of benefits, but also a lot of potential cybers...

Hideez is a SAML 2.0 Identity Provider

Hideez is a SAML 2.0 Identity Provider
Hideez SAML Identity Provider complements the Hideez Enterprise Server with new capabilities. The IdP uses HES identity store enabling authentication and providing federation for service providers which support SAML 2.0 Web Browser SSO Profile.

May the 4th Be With Your Cybersecurity

May the 4th Be With Your Cybersecurity
Get cybersecurity tips in a new Star Wars trilogy themed post and learn how to protect yourself against cyber crime. Heroes from a galaxy far, far away share their best advice for using strong passwords, keeping software up to date and more.