Related Posts
직장 전반의 "액세스 승인"에 대한 재해석 — Apple Wallet의 직원 배지
Apple Wallet의 HID 직원 배지는 조직의 유연성을 강화하고 생산성에 대한 인사이트를 제공하며 언제든지 권한 조정이 가능합니다.
We are all well-aware that passwords can be hacked, tracked, phished, shared, stolen and compromised. So … why are some organizations still allowing them throughout their ever-expanding connected workplace?
Cyber criminals are constantly lurking in the shadows. To them, lifting a password is like taking candy from a baby. What’s worse, is 67% of companies have password policies — but only 34% actually enforce them.
Pivoting to a passwordless existence might feel daunting and complicated — but proven systems are affordable and often can simply be an extension of your current digital investments. This makes it easy to expand and contract access as needed across your corporate landscape.
HID’s new infographic, The Passwordless Playground, shares some startling statistics around password use, and expands on four rules to follow as you take smart steps to tighten your access points.
Dig into more details around the following rules as you evolve your organization away from gaping holes that passwords put in your digital perimeter.
Speaking of FIDO, that’s one of the “friends” you’ll want to invite to your secure playground. As organizations modernize their systems to defend digital apparatus from cyber bullies, make sure these other important authentication acronyms are on the security scene. The orchestration of all four guarantees maximizes security and user convenience:
To summarize, companies need to carefully assess passwordless authentication to find the right combination that best fits their security processes. The daily, first-time authentication provides higher security with a combination of something the user knows (e.g., password), or something the user is (e.g., fingerprint), in combination with something the user has (e.g., FIDO token). When additional authentication is needed throughout the day, the transaction should be faster, using FIDO authentication without password or biometric verification. Adding password protection to the token prevents it from being used without further authentication. This step reduces vulnerability in case someone attempts to use the token before the user reports it as lost or stolen.
Ready to work and play within the Passwordless Playground? Read the infographic >>
Helmut has been in the security business for more than 25 years in various management roles for some of the leading suppliers of a broad range of security solutions. He also holds some patents. Within the last 20 years he has successfully led different engineering, global product management and marketing teams. His portfolio includes one of the first VPN products ever as well as solutions for HW-based encryption solutions in combination with RFID technologies managed by his various teams. He has been with HID now for more than 10 years with a focus on RFID technologies, and is used to challenging the status quo in seeking more customer-friendly solutions and services.