BBC Tech

Copycat coders create ‘vulnerable’ apps

Lazy developers who copy solutions to tricky programming problems are creating apps that are vulnerable to attack, research suggests. A team of computer scientists looked at more than 72,000 chunks of code found on the Stack Overflow website. The site is popular with developers seeking advice
/
Wired

The biggest threat of deepfakes isn’t the deepfakes themselves

The mere idea of AI-synthesized media is already making people stop believing that real things are real. It was late 2018, and the people of Gabon hadn’t seen their president, Ali Bongo, in public for months. Some began to suspect that he was ill, or
/
SSO

How SSO Software Works and Why Single Sign-On Is Important

The Functionality and Importance of SSO Software

SSO is an acronym for Single Sign-On, a software program which uses one set of login credentials to gain entry to multiple applications. The average person maintained 27 passwords in 2016, an increase from 6.5 in 2007. In the most simple form, SSO is used by businesses to reduce the sheer amount of passwords employees are required to keep track of, but there is more to it than that.

How Useful is Single Sign-On?

Perhaps the most obvious benefit to SSO is at the user end. A singular password is easier to remember and alter compared to requiring a separate password per application. However, this benefit has a secondary perk as well — productivity. Entering one password saves time and ensures that working hours are used more efficiently.

The IT department also benefits from the use of SSO. IT departments report that 30% of help desk calls are related to password reset issues. One password entry saves the IT department time spent resetting employee passwords, allowing them to focus on more pressing matters. SSO allows IT to maintain user management and easily adjust accounts across various platforms.

When multiple passwords are required, unfavorable habits develop where employees keep each code simple (easy to remember) versions of their other passwords. This can lead to a security risk for business and is one way SSO is safer for workplace security. However, SSO software may not be risk free.

SSO Software

Risk Prevention

Like any password protected applications, SSO software is vulnerable to malicious activity or hackers. However, there are ways to keep applications under SSO software safe. Primarily, users should create unique passwords containing both numbers and letters as will as additional punctuation marks. Additionally, use multi-factor identification with the login. Multi-factored logins ensure that the user’s identity is confirmed and creates a secure system.

Additional Benefits of SSO Software

Convenience, productivity, and security are three great reasons to implement SSO software, but there are additional benefits to the service. Most importantly, SSO software is a part of compliance protocols. The software is able to initiate and store terms and service agreements, keeping the information safe and handy for IT audits. SSO Software options have additional features, such as analytics with app usage statistics and membership groups that allow different employee roles to have access to only the applications they require. Some software choices also offer customizable user experiences allowing users to organize what they see by removing, editing or hiding applications. Users are also able to set up most-used applications to open upon launching the software.

Personal lives have also seen the rise of SSO software in the form of using social media accounts as login for multiple websites, helping to reduce the amount of passwords we use at home as well. The perks of using single sign-on software for business far outweigh possible risk, especially considering the risk is manageable. In this online age where passwords are required everywhere, SSO saves time, money, and lowers frustration levels within the workplace. Using SSO software is a smart, business friendly solution to password overload.

By Oles Kosiuk

Cloud Syndicate Contributor
Cloud Syndication
The ‘Cloud Syndicate’ is a mix of short term guest contributors, curated resources and syndication partners covering a variety of interesting technology related topics. Contact us for syndication details on how to connect your technology article or news feed to our syndication network.
follow me

POWERPOINT COMIC LICENSING | CLICK TO SEE MORE

Future Cybersecurity Challenges (5 Things To Expect)

Future Cybersecurity Challenges (5 Things To Expect)

Future Cybersecurity Challenges Every December, security experts begin to release their predictions on what future cybersecurity challenges will look like in the coming year. “The ...
5 Recommendations for Effective Governance, Risk and Compliance Management

5 Recommendations for Effective Governance, Risk and Compliance Management

Effective Governance, Risk and Compliance Cloud adoption continues to grow, which is evident from the fact that annual 2016 revenues for cloud vendors were “within ...
Steve Prentice CloudTweaks

Dark Clouds On The Horizon: The Rise Of Sophisticated Cybercrime

Sophisticated Cybercrime The story reads as if it were pulled from the pages of a Tom Clancy novel: a collection of US banks suddenly starts ...
Is Machine Learning The Future? Making Your Data Scientists Obsolete

Is Machine Learning The Future? Making Your Data Scientists Obsolete

Is Machine Learning The Future? In a recent study, almost all the businesses surveyed stated that big data analytics were fundamental to their business strategies ...