Alvaro Hoyos leads OneLogin’s risk management, security, and compliance efforts. He also works with prospects, customers and vendors to help them understand OneLogin’s security, confidentiality, availability, and privacy posture and how it works alongside, or in support of, customer’s own risk management model. Alvaro has over 15 years in the IT sector and prior to joining OneLogin, helped startups, SMBs, and Fortune 500 companies with their security and data privacy compliance efforts. His commentary and articles have been featured in several publications, including CIO, CSO, Network World, Infosecurity, eWeek, and Help Net Security. Alvaro is a member of the Forbes Technology Council and has a B.B.A in M.I.S. and a M.S. in M.I.S. from Florida International University.
Please note that there is no action required for users of the OneLogin platform itself; the required action is for developers that maintain apps that depend on any of the toolkits listed in the security advisory to use the provided patched versions.
When adopting “something you are” passwords, it is crucial that companies understand how to safely store biometric data to ensure that they aren't subjecting their employees to identity theft.
Many executives fail to see the larger role HR can play during and post-integration.
An organization’s data is only as secure as its endpoints. Over the last few years, a perfect storm of workforce and technology trends have collided making endpoint management a Sisyphean task.
While organizations take great pains to ensure their cloud providers are following best security practices, they often fail to adhere to these same procedures when migrating their applications and infrastructure.
When a laptop is stolen, it’s only natural to get a company’s IT department involved. But as employee identities become more complex and when sensitive data is at risk, it’s equally important to involve the human resources department as well.
Since the dawn of the information age, businesses have been using “something you know” passwords to secure access to company data. However, in today’s data-breach-of-the-week landscape, the password is no longer a sufficient method of protecting precious information.
In an effort to minimize the cyber risks brought on by your own employees, here are three security solutions that HR executives should consider.