icon

Hideez Blog | Identity Management News, Best practices & Tips

NYDFS Cybersecurity Regulation & NYDFS Compliance

NYDFS Cybersecurity Regulation & NYDFS Compliance

The NYDFS Cybersecurity Regulation is a set of regulations from the New York Department of Financial Services. This legislation places cybersecurity requirements on all financial institutions that operate in New York. It stipulates that all DFS-regulated companies should have cybersecurity plans, policies, and maintain detailed reporting systems for cybersecurity events.

Forget Your Password. Ultimate Guide to Passwordless Future

Forget Your Password. Ultimate Guide to Passwordless Future
People have an ancient-long history of using passwords. Let's recap the development of passwords and authentication technologies (2FA, MFA, OTP, U2F, FIDO2). Get the Manual on how to become passwordless in 2020.

Multi-factor Authentication: Why is a Separate Wearable Device Better Than Your Smartphone?

Multi-factor Authentication: Why is a Separate Wearable Device Better Than Your Smartphone?
In the United States, about 19% of the adult population has experienced identity theft. Over 60 million Americans have had their online identity exposed by hacks of the customer databases of their service providers or government agencies. The situation is similar in Europe and other countries.

Passwordless authentication: Reality for 2020?

Passwordless authentication: Reality for 2020?
Passwords suffer a major reputational crisis. Once considered safe and secure, they are now deemed the weak spot in every system. With passwordless authentication, there is no need to use passwords, which could practically eliminate the chances of suffering a security breach. 

Cybersecurity Best Practices for Employees

Cybersecurity Best Practices for Employees
Staff members can fall victim to many different security threats, companies can never be secure enough when it comes to safeguarding their sensitive information. Continue reading to find out the best practices for employees and how to implement them to improve employee cybersecurity awareness going into 2020. 

What is Zero Trust Security? Successful Zero Trust Implementation

What is Zero Trust Security? Successful Zero Trust Implementation
Zero Trust architecture has experienced a meteoric rise over the past couple of years, and it became a go-to choice for many organizations looking for a reliable security system. Despite popularity among big and small companies, Zero Trust model remains relatively unknown among average Internet users. 

What is CCPA and How to Become Compliant?

What is CCPA and How to Become Compliant?
The California Consumer Privacy Act, also known as CCPA, becomes effective on January 1, 2020. Its main goal is to secure personal information of individuals by obliging businesses to collect their consent before gathering or processing any sensitive or personal data. According to the broad consensus, the California Consumer Privacy Act will change the way businesses think about user data.

What is HIPAA Compliance? HIPAA Requirements 2020

What is HIPAA Compliance? HIPAA Requirements 2020
HIPAA is a legal act that establishes the rules for patient information protection. It makes it possible for healthcare patients to control their sensitive information and rely on organizations, which are required to implement standardized patient privacy and security structures. 

California Consumer Privacy Act 2020. What You Need to Know?

California Consumer Privacy Act

The California Consumer Privacy Act is effective on January 1st, 2020. This means that, in a little less than two months, California will be the first state to introduce a clear-cut and precisely defined privacy law. Intended to enhance privacy rights and consumer protection for the residents of the state of California, the CCPA takes a broad view of what constitutes private data.

What is Phishing? Phishing Types and Tips for Prevention

What is Phishing? Phishing Types and Tips for Prevention

Phishing means deceitful use of electronic communication services to defraud online users. Phishing emails are created with one sinister purpose in mind – to deceive the user and get a hold of his sensitive and valuable information such as credit card data, social security number, passwords, and other private details. 

What is Multi-factor Authentication? Advantages & Limitations

What is Multi-factor Authentication? Advantages & Limitations

In the world where people seem to remember only passwords like «qwerty», «Abc123!» and «123456789», there should be a way to protect their accounts. Luckily, there is an MFA. Available in many forms, it allows making even the worst of passwords more secure.

What is Identity Management? Enterprise Identity Management Solutions

What is Identity Management? Enterprise Identity Management Solutions
Cybersecurity has come a long way in the past two decades. So much so that proper identity management practices have become a basis for strong cybersecurity systems. In short, you always have to make sure that everyone is who they claim to be when requesting access. Equally as important, you should be certain that they are allowed to access what they’re requesting.