Author name: brendon

Okta Breach Alert: Everything You Need to Know [+ Lessons Learned]

Massive Okta Breach TL;DR: The Okta breach impacted all customer support users, revealing the vulnerability of secure systems. Okta responded by urging multi-factor authentication (MFA) activation and enhancing security measures. The incident highlights the need for perpetual vigilance in IAM security. Key lessons include regular security audits, testing incident plans, user training, access permission reviews, […]

Okta Breach Alert: Everything You Need to Know [+ Lessons Learned] Read More »

Release Notes: October 2023

Hello valued customer! Acsense began deployment of the latest Production Release on October 2023. Generally Available Features Preview for new UI: Better tenant management and visibility: Improved view of Protected Okta tenant. Improved view of Continuous Replication and status of the Stand-By Okta tenant. New: constant visibility to ongoing Recoverability Reports. Better investigation capabilities to

Release Notes: October 2023 Read More »

1Password Breach: The Ripple Effect of Okta’s Incident

Understanding 1Password’s Vulnerabilities Amid Okta’s Impact on IAM Resilience In a follow-up to our previous article, we continue to explore the security implications of the Okta customer support system breach, which was officially announced on October 20, 2023. With new details emerging from an internal report by 1pass, the incident raises significant concerns about Identity

1Password Breach: The Ripple Effect of Okta’s Incident Read More »

Okta Customer Support Breach: Lessons for IAM Resilience

Analyzing the Okta Customer Support Breach Through the Lens of BeyondTrust In a year marked by multiple high-profile breaches, the security incident involving Okta’s customer support system stands out. Announced on October 20, 2023, the incident has ignited conversations about the vulnerabilities associated with Identity and Access Management (IAM) platforms. This article delves into the

Okta Customer Support Breach: Lessons for IAM Resilience Read More »

How to Build a SaaS Disaster Recovery Plan

Mastering SaaS Disaster Recovery For IT Professionals Imagine, just for a moment, a minute of downtime on your SaaS platform. In that brief span, you could lose thousands of dollars, erode customer trust, and raise serious compliance questions. You’ve made a transformative decision. You transitioned your operations to a Software-as-a-Service (SaaS) environment to capitalize on benefits

How to Build a SaaS Disaster Recovery Plan Read More »

What Are Recovery Time Objectives (RTO) Best Practices?  

Maximizing Business Resilience With RTO and RPO: A Guide to Best Practices The recovery time objective and recovery point objective are crucial elements for cybersecurity. With similar-sounding acronyms, both are significantly different. The Recovery Time Objective concerns the downtime your business can tolerate after an incident or a disaster. Recovery Point Objective, however, talks about

What Are Recovery Time Objectives (RTO) Best Practices?   Read More »

McLaren’s ALPHV Ransomware Attack: What It Means for Healthcare

Healthcare’s Ransomware Crisis In the expanding realm of cyber threats, healthcare systems are finding themselves increasingly targeted. The recent ransomware attack on McLaren HealthCare, a prominent healthcare system in Michigan, offers a glaring testament to this disturbing trend. Breaking Down the ALPHV Attack McLaren HealthCare promptly launched an investigation upon detecting suspicious activities on its

McLaren’s ALPHV Ransomware Attack: What It Means for Healthcare Read More »

Scroll to Top
Skip to content