icon

Hideez Blog | Identity Management News, Best practices & Tips

What is CCPA and How to Become Compliant?

What is CCPA and How to Become Compliant?
The California Consumer Privacy Act, also known as CCPA, becomes effective on January 1, 2020. Its main goal is to secure personal information of individuals by obliging businesses to collect their consent before gathering or processing any sensitive or personal data. According to the broad consensus, the California Consumer Privacy Act will change the way businesses think about user data.

What is HIPAA Compliance? HIPAA Requirements 2020

What is HIPAA Compliance? HIPAA Requirements 2020
HIPAA is a legal act that establishes the rules for patient information protection. It makes it possible for healthcare patients to control their sensitive information and rely on organizations, which are required to implement standardized patient privacy and security structures. 

California Consumer Privacy Act 2020. What You Need to Know?

California Consumer Privacy Act

The California Consumer Privacy Act is effective on January 1st, 2020. This means that, in a little less than two months, California will be the first state to introduce a clear-cut and precisely defined privacy law. Intended to enhance privacy rights and consumer protection for the residents of the state of California, the CCPA takes a broad view of what constitutes private data.

What is Phishing? Phishing Types and Tips for Prevention

What is Phishing? Phishing Types and Tips for Prevention

Phishing means deceitful use of electronic communication services to defraud online users. Phishing emails are created with one sinister purpose in mind – to deceive the user and get a hold of his sensitive and valuable information such as credit card data, social security number, passwords, and other private details. 

What is Multi-factor Authentication? Advantages & Limitations

What is Multi-factor Authentication? Advantages & Limitations

In the world where people seem to remember only passwords like «qwerty», «Abc123!» and «123456789», there should be a way to protect their accounts. Luckily, there is an MFA. Available in many forms, it allows making even the worst of passwords more secure.

What is Identity Management? Enterprise Identity Management Solutions

What is Identity Management? Enterprise Identity Management Solutions
Cybersecurity has come a long way in the past two decades. So much so that proper identity management practices have become a basis for strong cybersecurity systems. In short, you always have to make sure that everyone is who they claim to be when requesting access. Equally as important, you should be certain that they are allowed to access what they’re requesting.

Who needs to comply with HIPAA? Advantages & Limitations

Who needs to comply with HIPAA? Advantages & Limitations

Health Insurance Portability and Accountability Act of 1996 (HIPAA) was developed as an industry standard to ensure strong protection of personal healthcare information (PHI). Department of Health and Human Services (HHS) regulates HIPAA compliance, and the Office for Civil Rights (OCR) enforces it.w.

Data Privacy & Security in Healthcare. Who needs to Comply with HIPAA?

data protection in healthcare hippa
The Health Insurance Portability and Accountability Act (HIPAA) is one of the key documents for every CISO working in healthcare. Written over 20 years ago, long before smartphones, WiFI or Google were invented, it still regulates healthcare information security in the industry. Learn how it is applied nowadays to ensure secure medical care.

Authentication in NIST Cybersecurity Framework | Smart Grid Profile for Improving Critical Infrastructure

NIST Cybersecurity Framework
The U.S. electric power grid is modernizing through “smart” technologies. These changes bring a lot of benefits, but also a lot of potential cybersecurity risks. National Institute of Standards and Technology (NIST) recently published Smart Grid Profile.

Hideez is a SAML 2.0 Identity Provider

Hideez is a SAML 2.0 Identity Provider
Hideez SAML Identity Provider complements the Hideez Enterprise Server with new capabilities. The IdP uses HES identity store enabling authentication and providing federation for service providers which support SAML 2.0 Web Browser SSO Profile.

Navigating HIPAA Authentication: Ensuring Compliance with Hideez

Navigating HIPAA Authentication: Ensuring Compliance with Hideez

There are many IT solutions on the market that can help healthcare organizations meet the security requirements for the Health Insurance Portability and Accountability Act’s (HIPAA) clauses on safeguarding protected health information (PHI). HIPAA’s security rule lays out specific administrative, physical, and technical components that are necessary for full compliance. .

How to Use Hideez Key's RFID Module

How to Use Hideez Key's RFID Module
Hideez Key can serve as an electronic key for home, office or gym. Using the RFID features does not require any additional software. Hideez Key is equipped with RFID module that works on the 125 kHz frequency bandwidth. The RFID antenna with the control unit can be found under the top cover.