Recent Posts by Kathleen Garska

 
Kathleen Garska is an experienced digital marketer and writer within the B2B and technology spaces. As Identity Automation’s Marketing Manager, she oversees the company’s digital, social, event, and blogging efforts. Beyond Marketing, her interests include art, design, travel, and cooking.

Two-Factor Authentication (2FA) Explained: Push Notifications

More and more, organizations are looking for cost-effective alternatives to traditional passwords that increase security without affecting usability. Many people believe that push notification authentication, a newer mobile-based authentication method, could be the answer.

Read More

Two-Factor Authentication (2FA) Explained: RFID Access Control

Historically, magnetic stripe cards were used for access control. However, these cards aren’t particularly secure, as the information stored on them is typically not encrypted. Additionally, they have to be physically swiped, leading to issues with wear and tear.

Read More

Two-Factor Authentication (2FA) Explained: 2D Barcode Authentication

As part of our 2FA Explained series, we recently looked at magnetic stripe cards. Another authentication method that has long been in use and can be printed onto cards are 2D barcodes.

Read More

Onboarding and Offboarding: 7 Identity Lifecycle Management Challenges Solved with Modern IAM, Part 2

In Part 1 of this series, we discussed the challenges that come with onboarding employees and granting access, specifically determining which permissions to give an employee, providing employees with day one access, and managing ad-hoc access requests.

Read More

Two-Factor Authentication (2FA) Explained: Magnetic Stripe Card

Today, there are many card-based options for controlling physical and network access. Although many organizations have transitioned to newer, more secure options, such as smart cards and RFID cards, others still have  magnetic stripe cards in place.

Read More

Onboarding and Offboarding: 7 Identity Lifecycle Management Challenges Solved with Modern IAM, Part 1

Identity lifecycle management presents a number of challenges: You need to quickly onboard employees so that they have access to the applications needed to do their jobs, you need to immediately offboard them when they leave the organization so they’re not a security threat, and you need to ensure IT isn’t bogged down with all changes in between as employees shift roles, get promoted, change locations, and so on.

Read More

Two-Factor Authentication (2FA) Explained: Social Login

Companies and end-users alike are constantly looking for authentication methods that lower barriers to entry and improve user experience without compromising security.

Read More

Healthcare Cybersecurity and the Human Factor: Using Risk-Based Authentication that Considers Behavioral Factors

In the healthcare industry, a lot of energy goes into driving practitioner efficiency and making patient data easier for clinicians to access. But is enough focus being put on security and protecting patient data?

News headlines indicate the answer is a resounding no. There have been a slew of notable healthcare breaches in recent years.

Read More

Two-Factor Authentication (2FA) Explained: Smart Cards

Smart cards are cards or cryptographic USB tokens that are used for a number of authentication purposes, including physical access (buildings, rooms), computer and network access, and some secure remote access solutions (virtual private networks (VPN), portals).

Read More

Two-Factor Authentication (2FA) Explained: One Time Password Hard Tokens

One time passwords (OTPs) are a popular choice for organizations looking to increase their security posture with two-factor authentication. As a refresher, OTPs are unique passwords that are only valid for a single login session and a defined period of time.

Read More

Subscribe Here!