top of page
BLOG
Here you can find educated and referenced articles about our experience with Identity and Access management, detailed information about what we do, and information we wanted to share with you!
![Don't let the Cyber-Grinch put a damper on your holiday](https://static.wixstatic.com/media/ff6297_738c4be3152849308e2a09bf3862305b~mv2.png/v1/fill/w_308,h_308,fp_0.50_0.50,q_95,enc_auto/ff6297_738c4be3152849308e2a09bf3862305b~mv2.webp)
Dec 19, 20244 min read
Don't let the Cyber-Grinch put a damper on your holiday
Stay safe with 12 simple cybersecurity tips to protect your data and peace of mind.
![Azure Mandatory MFA Updates and Okta Implications](https://static.wixstatic.com/media/ff6297_44fa5279c5d5490c940f4a45f9c1da1f~mv2.png/v1/fill/w_308,h_308,fp_0.50_0.50,q_95,enc_auto/ff6297_44fa5279c5d5490c940f4a45f9c1da1f~mv2.webp)
Oct 23, 20242 min read
Azure Mandatory MFA Updates and Okta Implications
Microsoft's MFA mandate for Azure admins starts in October. Okta integration updates needed by December 31, 2024.
![](https://static.wixstatic.com/media/ff6297_145198014d9a468e828413276cc7fda2~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,lg_1,q_30,blur_30,enc_auto/ff6297_145198014d9a468e828413276cc7fda2~mv2.webp)
![Understanding Okta's Identity Security Posture Management](https://static.wixstatic.com/media/ff6297_145198014d9a468e828413276cc7fda2~mv2.jpg/v1/fill/w_308,h_237,fp_0.50_0.50,q_90,enc_auto/ff6297_145198014d9a468e828413276cc7fda2~mv2.webp)
Sep 18, 20244 min read
Understanding Okta's Identity Security Posture Management
Okta's ISPM enhances identity security by offering visibility, risk management, and automation, helping organizations mitigate IAM risks.
![Beyond the Selfie: How Google's 'Add Me' AI is Reshaping Photographic Authenticity](https://static.wixstatic.com/media/ff6297_20c9d50ddca44f6a99dc9e41ddf0c4fb~mv2.png/v1/fill/w_308,h_308,fp_0.50_0.50,q_95,enc_auto/ff6297_20c9d50ddca44f6a99dc9e41ddf0c4fb~mv2.webp)
Aug 19, 20242 min read
Beyond the Selfie: How Google's 'Add Me' AI is Reshaping Photographic Authenticity
Google's "Add Me" AI on Pixel 9 lets users insert themselves into photos, raising questions about the future of photographic authenticity.
![](https://static.wixstatic.com/media/ff6297_c13231e5aa1d484798c42c625084c4bef000.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/ff6297_c13231e5aa1d484798c42c625084c4bef000.webp)
![Social Engineering Attacks Targeting IT Help Desks in the Health Sector](https://static.wixstatic.com/media/ff6297_c13231e5aa1d484798c42c625084c4bef000.jpg/v1/fill/w_308,h_308,fp_0.50_0.50,q_90,enc_auto/ff6297_c13231e5aa1d484798c42c625084c4bef000.webp)
Apr 24, 20243 min read
Social Engineering Attacks Targeting IT Help Desks in the Health Sector
With the rise of social engineering attacks on IT help desks, discover how Caller Verify combats cybersecurity threats.
![](https://static.wixstatic.com/media/a27d24_92e5b4de535649a08f5987c89eb23af5~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/a27d24_92e5b4de535649a08f5987c89eb23af5~mv2.webp)
![Tracey Nyholt: Making The Call Center Customer Verification Experience Secure And User-Friendly](https://static.wixstatic.com/media/a27d24_92e5b4de535649a08f5987c89eb23af5~mv2.jpg/v1/fill/w_308,h_308,fp_0.50_0.50,q_90,enc_auto/a27d24_92e5b4de535649a08f5987c89eb23af5~mv2.webp)
Apr 3, 20242 min read
Tracey Nyholt: Making The Call Center Customer Verification Experience Secure And User-Friendly
Tracey Nyholt discusses creating a secure, user-friendly caller verification solution, driven by a need for accessible security.
![Alternatives to Mobile Device Auth Factors](https://static.wixstatic.com/media/9007a5_9b3fbdc61da24f71852aa8a9f47845e4~mv2.png/v1/fill/w_308,h_308,fp_0.50_0.50,q_95,enc_auto/9007a5_9b3fbdc61da24f71852aa8a9f47845e4~mv2.webp)
Jan 8, 20241 min read
Alternatives to Mobile Device Auth Factors
Mobile devices have quickly become ubiquitous in modern working environments. So much so, that including them as part of a user’s...
![What can AI do for you?](https://static.wixstatic.com/media/9007a5_8685f2888b754382900a82735f682715~mv2.png/v1/fill/w_308,h_308,fp_0.50_0.50,q_95,enc_auto/9007a5_8685f2888b754382900a82735f682715~mv2.webp)
Dec 13, 20232 min read
What can AI do for you?
AI and machine learning are the hot new features in tech right now, from drawings to data mining. You’ve probably seen AI offerings...
![$4.45 Million Reasons to Secure Your Call Center](https://static.wixstatic.com/media/9ef484_d0341318c301402f943dcd710378913c~mv2.png/v1/fill/w_308,h_308,fp_0.50_0.50,q_95,enc_auto/9ef484_d0341318c301402f943dcd710378913c~mv2.webp)
Sep 8, 20231 min read
$4.45 Million Reasons to Secure Your Call Center
$4.45 million USD That’s the average total cost of a data breach in 2023. Much like everything else in the world, data breaches are...
![](https://static.wixstatic.com/media/9ef484_40fbb3fa2d2340339fd39ef59951da2a~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/9ef484_40fbb3fa2d2340339fd39ef59951da2a~mv2.webp)
![Is Your Bank Vulnerable to Voice AI?](https://static.wixstatic.com/media/9ef484_40fbb3fa2d2340339fd39ef59951da2a~mv2.jpg/v1/fill/w_308,h_308,fp_0.50_0.50,q_90,enc_auto/9ef484_40fbb3fa2d2340339fd39ef59951da2a~mv2.webp)
Jan 13, 20231 min read
Is Your Bank Vulnerable to Voice AI?
Are you using voice authentication to verify your customers? Hundreds of financial institutions are. While this might seem like a...
![What is Unified Verification?](https://static.wixstatic.com/media/9ef484_090810b375ec46779f1869c74af2c58c~mv2.png/v1/fill/w_308,h_308,fp_0.50_0.50,q_95,enc_auto/9ef484_090810b375ec46779f1869c74af2c58c~mv2.webp)
Oct 25, 20221 min read
What is Unified Verification?
Unified Verification is harmonizing verification methods across online, mobile and call center experiences. Users have it tough these...
![](https://i.ytimg.com/vi/m118-RX_D3U/maxresdefault.jpg)
![Cut Cart Abandonment with Okta and TechJutsu](https://i.ytimg.com/vi/m118-RX_D3U/maxresdefault.jpg)
Aug 23, 20221 min read
Cut Cart Abandonment with Okta and TechJutsu
Want to learn how to cut cart abandonment with the power of Okta and TechJutsu?
![](https://static.wixstatic.com/media/9ef484_b41cc5d8244441daa65f9c8ec46f7501~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/9ef484_b41cc5d8244441daa65f9c8ec46f7501~mv2.webp)
![Using Employee Status to Drive Okta Workflows](https://static.wixstatic.com/media/9ef484_b41cc5d8244441daa65f9c8ec46f7501~mv2.jpg/v1/fill/w_308,h_308,fp_0.50_0.50,q_90,enc_auto/9ef484_b41cc5d8244441daa65f9c8ec46f7501~mv2.webp)
Mar 21, 20222 min read
Using Employee Status to Drive Okta Workflows
In the world of workforce Identity and Access Management, a person’s employee status is critical. Whether they are full-time, part-time,...
![Call Center: The Weakest Link](https://static.wixstatic.com/media/9ef484_dba116195dbb42ba8326d3b4fc5a29fd~mv2.png/v1/fill/w_308,h_308,fp_0.50_0.50,q_95,enc_auto/9ef484_dba116195dbb42ba8326d3b4fc5a29fd~mv2.webp)
Aug 26, 20212 min read
Call Center: The Weakest Link
Headlines like “Bank won't reimburse Ottawa woman who lost $23K to fraudsters, family says” | CBC News this past week are not only costly...
![Caller Verify: Our Grandparents Story](https://static.wixstatic.com/media/bd2b34_0702a27053ae4a369c6c4c50464542c0~mv2.png/v1/fill/w_225,h_151,fp_0.50_0.50,q_95,enc_auto/bd2b34_0702a27053ae4a369c6c4c50464542c0~mv2.webp)
Jun 24, 20212 min read
Caller Verify: Our Grandparents Story
The story of TechJutsu Caller Verify is the story of our grandparents. Our loved ones who have seen the evolution of the television, the...
![Reduce Your Cyber Insurance Costs with MFA](https://static.wixstatic.com/media/f94079_5acfdaeaf19e43d48d7e28c0af5d5d85~mv2.png/v1/fill/w_308,h_308,fp_0.50_0.50,q_95,enc_auto/f94079_5acfdaeaf19e43d48d7e28c0af5d5d85~mv2.webp)
Mar 25, 20212 min read
Reduce Your Cyber Insurance Costs with MFA
We all know that insurance is important to have for every aspect of life, from car insurance to health insurance to life insurance. With...
![1Kosmos Passwordless](https://static.wixstatic.com/media/f94079_66aedf7e20b348a99fddc6f036b64910~mv2.png/v1/fill/w_308,h_308,fp_0.50_0.50,q_95,enc_auto/f94079_66aedf7e20b348a99fddc6f036b64910~mv2.webp)
Feb 11, 20212 min read
1Kosmos Passwordless
Digital Identity and Passwordless Authentication for Workforce and Customers Data breaches are at an all-time high. Employees and...
![An Award Winning Company](https://static.wixstatic.com/media/883cc9_95a87e066dac4a28b46fc7c8692612c1~mv2.png/v1/fill/w_308,h_308,fp_0.50_0.50,q_95,enc_auto/883cc9_95a87e066dac4a28b46fc7c8692612c1~mv2.webp)
Feb 9, 20211 min read
An Award Winning Company
We are honoured be the only Canadian company to have won an award at Okta FY22, the Innovation Award! We are always looking for unique...
![](https://static.wixstatic.com/media/f94079_ee28e0fb07ec44bfbfce15658f7f6444~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,lg_1,q_30,blur_30,enc_auto/f94079_ee28e0fb07ec44bfbfce15658f7f6444~mv2.webp)
![Time to Think Beyond the Password](https://static.wixstatic.com/media/f94079_ee28e0fb07ec44bfbfce15658f7f6444~mv2.jpg/v1/fill/w_200,h_200,fp_0.50_0.50,q_90,enc_auto/f94079_ee28e0fb07ec44bfbfce15658f7f6444~mv2.webp)
Jan 21, 20212 min read
Time to Think Beyond the Password
Adding Value with TechJutsu, Beyond, and Okta If you feel like you’re hearing about Zero Trust all the time, you’re not alone. The Zero...
![Crayonic + Okta: Passwordless Single Sign-On](https://static.wixstatic.com/media/f94079_31e16dbdfafc4b708023f7ce35fb1006~mv2.png/v1/fill/w_308,h_308,fp_0.50_0.50,q_95,enc_auto/f94079_31e16dbdfafc4b708023f7ce35fb1006~mv2.webp)
Jan 8, 20212 min read
Crayonic + Okta: Passwordless Single Sign-On
Sometimes your users just can’t use a password – their hands are full, or they can’t be ungloving and re-gloving their hands to type on a...
bottom of page