How to secure your organization with anonymity unicorns

Healing crystals

I was reading in the news over the weekend about how nobody wants to know how their “healing crystals” are obtained.

Don’t worry. We’re not going to dive into the world of alternative healing and vortexes. The story stuck in my head because I have friends who do believe in these things, and I remember they educated me on all of their properties.

I don’t believe in any of it, but I do try to remain curious regarding their stories because one of my hobbies is writing fiction. I like to listen to as many stories as I can for research. In fact, I’m on a binge currently writing crime thrillers, which is why I was even reading this story in the first place. It gave me an idea for a short story.

But alas, I also have a deadline to write blog posts, so I’m killing two birds with one stone and using that story to inspire this blog post.

Not only are we doubtful about the power of healing crystals (unless you’re writing the script for the next Marvel movie), we are doubtful about user identities when they visit our websites and applications.

This is why there’s been a move to start using more information to ascertain the user’s identity to strengthen security.

Unfortunately, the upcoming GDPR from the EU may not allow us to do that. As with many regulations, they are not designed with finesse. They are blunt weapons when we need precision.

As I remarked to one of my friends – people want to have strong security, but they believe we can accomplish this with magical anonymity unicorns.

Unfortunately, we don’t have any of these unicorns.

We need to figure out how to make sure our strong security systems comply with GDPR and other regulations, and using a system like the SPGateway as a proxy between your on-premises applications and your Identity-as-a-Service such as Okta or Oracle IDCS will simplify this.

You can find out how to accomplish this by arranging a call with us today buy clicking here.