top of page
BLOG
Here you can find educated and referenced articles about our experience with Identity and Access management, detailed information about what we do, and information we wanted to share with you!

Dec 19, 20244 min read
Don't let the Cyber-Grinch put a damper on your holiday
Stay safe with 12 simple cybersecurity tips to protect your data and peace of mind.

Oct 23, 20242 min read
Azure Mandatory MFA Updates and Okta Implications
Microsoft's MFA mandate for Azure admins starts in October. Okta integration updates needed by December 31, 2024.


Sep 18, 20244 min read
Understanding Okta's Identity Security Posture Management
Okta's ISPM enhances identity security by offering visibility, risk management, and automation, helping organizations mitigate IAM risks.

Aug 19, 20242 min read
Beyond the Selfie: How Google's 'Add Me' AI is Reshaping Photographic Authenticity
Google's "Add Me" AI on Pixel 9 lets users insert themselves into photos, raising questions about the future of photographic authenticity.


Apr 24, 20243 min read
Social Engineering Attacks Targeting IT Help Desks in the Health Sector
With the rise of social engineering attacks on IT help desks, discover how Caller Verify combats cybersecurity threats.


Apr 3, 20242 min read
Tracey Nyholt: Making The Call Center Customer Verification Experience Secure And User-Friendly
Tracey Nyholt discusses creating a secure, user-friendly caller verification solution, driven by a need for accessible security.

Jan 8, 20241 min read
Alternatives to Mobile Device Auth Factors
Mobile devices have quickly become ubiquitous in modern working environments. So much so, that including them as part of a user’s...

Dec 13, 20232 min read
What can AI do for you?
AI and machine learning are the hot new features in tech right now, from drawings to data mining. You’ve probably seen AI offerings...

Sep 8, 20231 min read
$4.45 Million Reasons to Secure Your Call Center
$4.45 million USD That’s the average total cost of a data breach in 2023. Much like everything else in the world, data breaches are...


Jan 13, 20231 min read
Is Your Bank Vulnerable to Voice AI?
Are you using voice authentication to verify your customers? Hundreds of financial institutions are. While this might seem like a...

Oct 25, 20221 min read
What is Unified Verification?
Unified Verification is harmonizing verification methods across online, mobile and call center experiences. Users have it tough these...


Aug 23, 20221 min read
Cut Cart Abandonment with Okta and TechJutsu
Want to learn how to cut cart abandonment with the power of Okta and TechJutsu?


Mar 21, 20222 min read
Using Employee Status to Drive Okta Workflows
In the world of workforce Identity and Access Management, a person’s employee status is critical. Whether they are full-time, part-time,...

Aug 26, 20212 min read
Call Center: The Weakest Link
Headlines like “Bank won't reimburse Ottawa woman who lost $23K to fraudsters, family says” | CBC News this past week are not only costly...

Jun 24, 20212 min read
Caller Verify: Our Grandparents Story
The story of TechJutsu Caller Verify is the story of our grandparents. Our loved ones who have seen the evolution of the television, the...

Mar 25, 20212 min read
Reduce Your Cyber Insurance Costs with MFA
We all know that insurance is important to have for every aspect of life, from car insurance to health insurance to life insurance. With...

Feb 11, 20212 min read
1Kosmos Passwordless
Digital Identity and Passwordless Authentication for Workforce and Customers Data breaches are at an all-time high. Employees and...

Feb 9, 20211 min read
An Award Winning Company
We are honoured be the only Canadian company to have won an award at Okta FY22, the Innovation Award! We are always looking for unique...


Jan 21, 20212 min read
Time to Think Beyond the Password
Adding Value with TechJutsu, Beyond, and Okta If you feel like you’re hearing about Zero Trust all the time, you’re not alone. The Zero...

Jan 8, 20212 min read
Crayonic + Okta: Passwordless Single Sign-On
Sometimes your users just can’t use a password – their hands are full, or they can’t be ungloving and re-gloving their hands to type on a...
bottom of page