Identity Automation Blog

Multi-Factor Authentication and the Identity and Access Management Capability Maturity Model, Part One

By now, we should all be aware of the inadequacies of passwords. Breach after breach, it's been made painfully clear that single-factor authentication is not enough. In fact, according to the 2017 Verizon Data Breach Report, over 80% of hacking related breaches are due to weak or stolen passwords.

Read More

Federated Identity Management: A Logical First Step in the IAM Maturity Model

Identity and Access Management (IAM) is a complex discipline that encompasses a number of distinct tenets, such as multi-factor authentication (MFA), single sign-on (SSO), and identity lifecycle management (ILM). When it comes to IAM, organizations have widely varying levels of maturity. While some have full-featured, modern IAM solutions in place, others are just making the move to cloud- or SaaS-based applications and are still manually creating users and passwords.

Read More

Preventing the Top Healthcare Cybersecurity Risks with IAM, Part 1 - Social Attacks & Phishing Schemes

In healthcare, the pressure is always on to drive down overall costs and provide higher levels of patient care. The result: a never-ending quest to increase efficiency. EMR’s, telehealth tools, and other third-party IT solutions that enhance productivity and streamline clinician workflows have become the norm.

Read More

Modern IAM and the Student and Alumni Experience

Delivering an optimal student and alumni experience is top requirement for CIOs at higher education institutions. More and more, this puts pressure on them to provide an optimal digital experience, as technology and cloud resources continue to play a growing role on college campuses.

Read More

Choosing the Right Proximity Badge Access Solution for Your Healthcare Organization

In busy hospital settings, clinicians move from room to room and department to department. They require multiple logins as they switch from one workstation to another and access multiple endpoint devices, such as thick and thin clients running Windows- or Linux-based operating systems.

Read More

Two-Factor Authentication (2FA) Explained: Email and SMS OTPs

One time passwords (OTPs) are a popular choice for organizations looking to step up their security with two-factor authentication (2FA). These randomly generated passwords are only valid for a single login session and overcome many of the vulnerabilities of traditional passwords.

Read More

Two-Factor Authentication (2FA) Explained: Challenge Response Authentication

Challenge/Response, also known as knowledge-based authentication, is a form of authentication where users verify their identities by answering “challenge” questions based on personal information about the user.

Read More

Two-Factor Authentication (2FA) Explained: Push Notifications

More and more, organizations are looking for cost-effective alternatives to traditional passwords that increase security without affecting usability. Many people believe that push notification authentication, a newer mobile-based authentication method, could be the answer.

Read More

Two-Factor Authentication (2FA) Explained: RFID Access Control

Historically, magnetic stripe cards were used for access control. However, these cards aren’t particularly secure, as the information stored on them is typically not encrypted. Additionally, they have to be physically swiped, leading to issues with wear and tear.

Read More

Two-Factor Authentication (2FA) Explained: 2D Barcode Authentication

As part of our 2FA Explained series, we recently looked at magnetic stripe cards. Another authentication method that has long been in use and can be printed onto cards are 2D barcodes.

Read More

Subscribe Here!