• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH
Network Security, News

Tech Managers Need Identity Management Techniques (For Personal AND Business Data)

MSPs tell us how important it is to lock down your and your employees' personal info with identity management techniques in order to protect business data.

December 4, 2019 Adam Forziati Leave a Comment

Identity Management Techniques,

We at TechDecisions have spoken with many MSPs recently, and as a result, we’re feeling a bit… paranoid. I’m personally about to download a password manager since that was identified as one of the most common identity management techniques MSPs advise their clients use. Now more than ever, I’m afraid any personal data compromised might have a negative effect on my workplace.

Maybe, though, it’s not right to call this feeling “paranoia.” After all, MSPs have literally told us how they feel they need to educate tech managers, IT departments, and other business leaders about the threats posed to their businesses via sloppy personal data management.

Raffi Jamgotchian, president/CTO of Triada Networks and one of those MSPs we spoke with, says there is a disconnect in lower level employees between what MSPs show them about business data and how they make personal data decisions — and that disconnect can be solved with identity management architecture.

“By understanding how these things can impact them personally, they realize why it is important to bring that attitude to their work,” he said.

This is something CEOs already seem to understand, says Jamgotchian. He says business owners don’t normally have this problem because many of them tie together their personal and business lives, anyway. So if one connection is secure, they all tend to be.

But not true for the rest of the org chart.

Common identity attacks are digital AND physical

Like we said, MSPs have noticed how personal data is used to target business data. One of the most common attacks goes something like this:

  • An office manager or personal secretary is contacted
  • The message contains information that the supposed sender would know/phrased in a way they would phrase it (this is actually the attacker using social engineering to their advantage)
  • The employee is asked to complete a task — such as providing critical business data, buying and revealing gift card codes, etc. — and confirm this via email or phone

Edward Manna of MSP company Technology On Demand says one of his clients was contacted about a bank transfer. But this time, it was the company’s physical mailbox which was compromised.

“When they can look at sent mail, and know a company’s website and mail habits, that’s dangerous,” Manna says.

“When you think about it, how many people leave building access and proximity cards in their personal vehicles?”

Identity management techniques used by MSPs

There are a number of identity management techniques MSPs enlist to help keep their clients’ business data secure. But, critically, Manna and Jamgotchian both said the challenge is ensuring employee-clients follow up by using them to secure both their personal and their business data.

“Once we take 5-10 minutes to review something, it has a dramatic effect on how often we’re called on an issue,” says Manna. “But we reinforce these lessons with product scanning and fake phishing campaigns to prove our point.”

So the takeaway for CIOs, Tech Managers, and the greater IT department is: make sure your org’s employees at every level follow up with all of these tips. It’s a constant struggle, but one that is worth the effort.

Here are some more personal and business data security tips:

  • use password managers — i.e. EVERY website/service has a different, complex password
  • employ multi-factor authentication — especially on all BYOD devices, the mailbox, email, etc.
  • establish (and regularly update) a list of trusted sources — that way, employees will know who and how potential phishers may target them and with what data they might try to do so with

Read Next: The Cyber Security Checklist: Make Sure Employees Follow These 4 Cyber Security Best Practices

If you enjoyed this article and want to receive more valuable industry content like this, click here to sign up for our digital newsletters!

Tagged With: Cyber Security, Data Security

Related Content:

  • Cloud, SASE, Aryaka How the Cloud is Redefining Media Production and…
  • Singlewire Software mass notification interview Singlewire Software on Mass Notification Solutions
  • URI catchbox 1 Catchbox Plus: The Mic Solution That Finally Gave…
  • Engaging virtual meeting with diverse participants discussing creative ideas in a bright office space during daylight hours Diversified Survey: Workplace AV Tech is Falling Short,…

Free downloadable guide you may like:

  • Download TechDecisions' Blueprint Series report on Security Awareness now!Blueprint Series: Why Your Security Awareness Program is Probably Falling Short

    Learn about the evolution of phishing attacks and best practices for security awareness programs to ensure your organization is properly prepared to defend against them in this report from TechDecisions' Blueprint Series.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Latest Downloads

Practical Design Guide for Office Spaces
Practical Design Guide for Office Spaces

Recent Gartner research shows that workers prefer to return to the office for in-person meetings for relevant milestones, as well as for face-to-fa...

New Camera Can Transform Your Live Production Workflow
New Camera System Can Transform Your Live Production Workflow

Sony's HXC-FZ90 studio camera system combines flexibility and exceptional image quality with entry-level pricing.

Creating Great User Experience and Ultimate Flexibility with Clickshare

Working and collaborating in any office environment today should be meaningful, as workers today go to office for very specific reasons. When desig...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.