Industry blog

Posted: 14 Sep 2017

With PIV and CAC credentials, US federal agencies and military bases have issued the most powerful ID credential for their employees and contractors.  PIV/CAC credentials provide a secure, standardized identification that can be trusted across US government organizations thanks to the use of US Federal Bridge Certificate Authority.  PIV/CAC credentials are used to login to computer, network...

Posted: 08 Sep 2017

You have likely read about the recent Equifax hack, where hackers accessed personal information of 143 million consumers.  You need to be concerned because the type of information that could have been accessed can be used to commit fraud and identity theft.  If you haven’t already, it’s time to take some steps to protect yourself and lock down your information.  Here are some specific steps...

Posted: 05 Sep 2017

There are many applications for identification and sensing technologies that are driving a connected oil, gas and refinement ecosystem. Organizations in the industry are experiencing success to help automate processes, improve visibility across the operation, and minimize operational risk by embracing the Internet of Things (IoT). From operating an oil rig to tracking thousands of assets...

Posted: 31 Aug 2017

Government agencies can realize several benefits from implementing a mobile ID. These are widely varied, depending upon the use case, but at a minimum, the government agency issuing credentials would greatly reduce its costs in implementing and maintaining complex infrastructures to assign, revoke or change someone’s credential. Further, governments could greatly reduce their risk and the...

Posted: 30 Aug 2017

Visitor management in the workplace is changing. The paper-based log book with handwritten badges that used to be sufficient is now giving way towards more professional and automated solutions.  I would like to share some insights for managing data within a visitor management solution that I have uncovered while talking to schools, corporate offices, hospitals and others.  In these...

Posted: 15 Aug 2017

According to a recent Strategy Analytics report, 42% of the global workforce will be considered mobile by 2022.  And for good reason, Gallup’s latest...

Posted: 18 Jul 2017

Did you know that that 95% of universities and colleges still rely on legacy technology such as magnetic stripes or simple proximity cards for access control?  Unfortunately, this dated technology leaves these institutions open to security vulnerabilities that often result in increased duplication and fraudulent card use.

However, as university populations have grown and technology...

Posted: 13 Jul 2017

Recent situations of mis-issued certificates have created some confusion for consumers and web site owners– wondering if SSL is still a secure method for on-line transactions.  The answer is still yes, but the web site owner is on the hook to make the right choice when it comes to their SSL certificate.    

In the past, Web Site Administrators automatically focused their research on the...

Posted: 27 Jun 2017

Every year colleges and universities produce millions of cards that are used for everything from paying for meals and checking out library books to entering dorm rooms. Over the past 20 years the way that these cards are issued has not changed much. Traditionally, ID cards are designed and printed from a PC that is connected to a nearby printer. Multiple printers would require multiple...

Posted: 15 Jun 2017

Fake identities posing as “trusted sources” and the lack of multi-factor authentication were exposed at the core of the recent swarm of malicious “Google Docs” phishing attacks across the world.  The attacks were effective because they looked like they were coming from someone you trust, asking...

Pages