Blog Day 4: Standardize on Chrome and Adjusting Settings We recommend standardizing on Chrome as your internal browser. Why? By standardizing on one browser,…Dana WolfFebruary 2, 2023
Blog Day 3: Securing your Apps – Review and Restrict Settings in Google Workspace Apps Restricting unnecessary data sharing is key to any information security strategy. Why? It helps to…Dana WolfFebruary 1, 2023
Blog Day 2: Securing Your Login – Review and Update Authentication Settings Today our focus is on authentication settings. If you are using Google Workspace as your…Dana WolfJanuary 31, 2023
Blog Start the New Year on the Right Foot: A 5-Day Challenge for Securing Your Google Workspace Introduction from YeshID At YeshID, we're big fans of Google Workspace and have adopted it…Dana WolfJanuary 30, 2023
Blog The YeshID kitchen: where security and usability meet Identity and access management is a nuanced problem. Everyone hates it, and with good reason.…Alex VaystikhJanuary 27, 2023
Blog Decentralized Verifiable Credentials for the future of Identity and Access Management Long long ago when people used “pay-phones” and listened to the music of our modems…Alex VaystikhJanuary 12, 2023
Blog Give Passwords the Finger Everyone who loves passwords and multi-factor authentication, raise your hand. <crickets> “I’m MEEEE!” I want…Dana WolfJanuary 5, 2023
Blog Passkey User Experience: Two Steps Forward, One Step Back At YeshID, we are obsessed with making identity and Access Management (IAM) as simple as…Alex VaystikhNovember 17, 2022
Blog How to cut costs, pass compliance, and secure your company with visibility Hi SME (Small and Medium Enterprise) folks. You are front of mind for us here…Dana WolfNovember 14, 2022
Blog We hired an engineering team that worked together, and this happened! Dana and I think hiring is one of the most important parts of what we…Alex VaystikhNovember 3, 2022