blog

Product news and pro tips from the YeshID team

Day 5: Securing your data - Managing and monitoring applications access

Audit all apps, mark trusted ones, and limit scopes for others to prevent data leaks through unmanaged OAuth apps
Read more

Day 4: Standardize on Chrome and Adjusting Settings

Standardize on Chrome for simplified IT management, enhanced security, lower costs, and compliance.
Read more

Day 3: Securing your Apps - Review and Restrict Settings in Google Workspace Apps

Restricting unnecessary data sharing is key to any information security strategy.Why?It helps to minimize the potential
Read more

Day 2: Securing Your Login - Review and Update Authentication Settings

Enable two-factor authentication (2FA) and enforce strong passwords in Google Workspace. These settings enhance security
Read more

Start the New Year on the Right Foot: A 5-Day Challenge for Securing Your Google Workspace

Enable 2FA and strong passwords in Google Workspace for enhanced security.
Read more

The YeshID kitchen: where security and usability meet

Read more

Decentralized Verifiable Credentials for the future of Identity and Access Management

Read more

Give Passwords the Finger

Read more

Passkey User Experience: Two Steps Forward, One Step Back

Read more
Ready to take control of your identity access management?
Sign up