Industry blog

Posted: 21 Jan 2021
mchandarana's picture

In December 2020, a significant number of organizations and US Government agencies were victims of a sophisticated cybersecurity attack started primarily by a trojan backdoor hidden in a routine update of SolarWinds Orion software. While experts are still uncovering details, they have concluded that the attackers...

Continue reading >>
Posted: 19 Jan 2021
lmerredew's picture

In the first blog, we shared information about the benefits of partnering with a reliable mobile access control systems provider to protect your company’s buildings, employees and assets.

These benefits are...

Continue reading >>
Posted: 19 Jan 2021
troz's picture

Getting in and Logging on With Mobile Access

There’s an app for just about everything these days — including access control. While many organizations stick with tried-and-true smart cards, others are branching out into the flexible, high tech and high security world of mobile access, verifying trusted identities with credentials like smart phones and wearables.

...

Continue reading >>
Posted: 18 Jan 2021
tgrover's picture

Form and Function

A passport is an objet d’art that we experience through sight, sound and touch — from the raised edge of the intaglio print to the rustle of its deeply luxurious paper. A passport contains both layered security features and layers of experiential detail. It is a puzzle of microtexts and hidden features that must be explored with one’s nose pressed to the page, peered...

Continue reading >>
Posted: 18 Jan 2021
abull's picture

A customer’s bank data is only as secure as your weakest link, and in many cases that’s the physical aspect of protecting bank premises, assets and sensitive locations. Robust Identity and Access Management (IAM) is critical to both logical and physical security. We’ve covered...

Continue reading >>
Posted: 12 Jan 2021
dmadan's picture

Financial institutions, application makers, and FinTech startups have a tricky needle to thread — ensuring that their customer and business data has the highest levels of protection without making financial applications hard to use. It’s a common problem, as the more sophisticated online apps and integrations become, the more difficult it is to secure identities.

Our digital identities...

Continue reading >>
Posted: 12 Jan 2021
marco.mancini's picture

ATM Security Beyond PINs and Cards

Where there is money, there are motives and opportunities for theft. Automated Teller Machines (ATMs) are particularly vulnerable targets — found all over and usually unattended in evening hours. Pin codes are often the only form of protection for ATMs, but they can be easily stolen or forcibly obtained.

...

Continue reading >>
Posted: 05 Jan 2021
tseeley's picture

Fast, Efficient and Compliant Verification for Healthcare

Biometric authentication is already widely used as a secure, compliant and simple way to authenticate medical staff and clinicians. Still, many medical facilities rely on bar code ID bracelets to identify patients, which are inexpensive but can be easily swapped...

Continue reading >>
Posted: 22 Dec 2020
mchandarana's picture

Electronic Prescribing of Controlled Substances (EPCS) is here. Many states have already adopted the rules associated with this new regulation and the remaining states are expected to become compliant over the next couple of years. If you're involved in prescribing or distributing medication, then you need to understand the impact EPCS will have on you. We'll break down why EPCS compliance is...

Continue reading >>
Posted: 21 Dec 2020
SWarne's picture

One of the striking things about Identity Week 2020 was how the industry has started to embrace digital identity in all its forms. Whether this has been accelerated by the need to identify citizens remotely during a pandemic, the fact that digital was just inevitable, or that the technology has leapt forward — the appetite to talk about how digital could be enabled spanned all the workstreams...

Continue reading >>

Pages