Recent Posts by Kathleen Garska

 
Kathleen Garska is an experienced digital marketer and marketing communications specialist within the B2B and technology spaces. With a decade of professional writing and editing experience, Kathleen heads Identity Automation's content program, managing the strategic direction of the company's blog, website, and content resources. As Identity Automation’s Marketing Manager, she also oversees the company’s digital marketing and demand generation efforts. Beyond Marketing, Kathleen is a dedicated (see: obsessed) dog mom to two rotten terriers, and she loves art, travel, cooking, yoga, and cycling.

Two-Factor Authentication (2FA) Explained: One Time Password Hard Tokens

One time passwords (OTPs) are a popular choice for organizations looking to increase their security posture with two-factor authentication. As a refresher, OTPs are unique passwords that are only valid for a single login session and a defined period of time.

Read More

Two-Factor Authentication (2FA) Explained: One Time Password Soft Tokens

In today’s dynamic business environment, organizations are putting more and more pressure on users to increase productivity without sacrificing security. However, a company’s infrastructure needs to be nimble enough to meet these needs without negatively affecting user experience.

Read More

The Zero Trust Model - What It is and Why It Starts with Identity

The digital transformation has significantly increased risk exposure for enterprises. With users operating a variety of devices from a variety of locations, there is a greater attack surface with less IT oversight and control.

Read More

Alternative Authentication for Students, Part 2 - Pictograph Authentication


Technology in the classroom creates usability issues for very young students in pre-k, kindergarten, and first grade, as well as special education students. For many of these students, remembering and typing even simple usernames and traditional passwords is a struggle.

Read More

Alternative Authentication for Students, Part 1 - QR Code Badges



Schools are integrating technology and cloud resources into the classroom with ever-growing frequency. Overall education technology spending is expected to reach $19 billion by 2019 on a global scale. It’s easy to see why: Technology in the classroom has the ability to increase collaboration and productivity, create a more personalized learning experience, and enable teachers to distribute assignments and provide real-time feedback.

Read More

Meeting Compliance Requirements - What Your Organization Should Know

Let’s be real. Attackers are growing more and more emboldened by the day. As their tools become so simple that even “script kiddies” can use them to wreak havoc on unsuspecting targets, governing bodies are putting added emphasis on tighter regulatory compliance.

Read More

Retail Data Breach Update: Top 3 Cyber Threats To Retailers and how IAM Can Help

While the volume of cyberattacks is on the rise across the board—attacks are up 100 percent since 2015—retail is particularly at risk. And the numbers back that up.

One study found that retailers respond to cyberattacks on average twice a week, with an astonishing 16 percent experiencing attempted attacks daily.

Read More

A Look at the Two-Factor Authentication (2FA) Requirements for Common Compliance Regulations in Higher Education - Part 2

In our last post, we discussed the growing role of two-factor authentication (2FA) in university security as more and more federal regulations are advocating or flat-out mandating its implementation.

Read More

Two-Factor Authentication (2FA) Explained: Biometric Authentication

With multi-factor authentication (MFA), there are three types of authentication factors: something you know (knowledge), something you have (possession), and something you are (inherence).

Read More

Assigning Authentication Risk Levels, the Problem with the Traditional Approach

The employees in your organization are all different. There are people in marketing and finance and HR. There are people who always work from the office, those who always work from home, and those always on the road. Some employees need lots of access to sensitive data and systems to do their job, while others only need basic access to standard applications.

Read More

Subscribe Here!