Welcome to the rf IDEAS blog. Here, you’ll find our insights, trend information and guidance on a wide range of identification and authentication-related topics. Our authors are experts at rf IDEAS as well as partners and guests bloggers who bring their own perspectives. Browse, learn and enjoy.
As the logical access control pioneer and long-time leader, rf IDEAS is laser-focused on the opportunities for mobile access. Our WAVE ID® Mobile Readers work with today’s most widely used mobile credentials—including HID® Mobile Access, Orange Business Services Pack ID and Safetrust Wallet—while simultaneously supporting virtually every proximity and smartcard technology used worldwide.
Username and password schemes bring multiple risks, from weak and stolen passwords to shared keyboards that can spread pathogens. rf IDEAS has simple suggestions for avoiding these threats while enabling users to be more productive—at home and in the office.
As we all know, the long, national nightmare known as the opioid crisis continues to drag on across the U.S. According to a recent American Psychiatric Association poll, nearly one of three Americans knows someone addicted to some form of opioid. And, according to the CDC, on average, 130 Americans die every day from an opioid overdose.
When it comes to IAM, state governments are concerned about managing access for both their employees and the citizens they serve. According to Doug Robinson, NASCIO’s executive director, “enterprise IAM approaches and solutions are gaining more traction in the states and are essential for managing secure employee access and supporting digital government platforms for citizens.”
User badge authentication should simplify lives and wallets – not add an additional layer of complexity.
With more than 60% of the world’s population owning a mobile phone, business use of smartphones has become ubiquitous for the workforce around the world.
Healthcare workers’ hands often come into contact with blood, secretions, and many other substances in the course of a workday. These substances can be easily spread to the computer keyboard as clinicians input information, review doctor’s orders and navigate application screens. Moreover, keyboards are notoriously hard to clean because bacteria can become lodged beneath and between keys, and in areas that are hard to reach and disinfect.
When passwords first came into vogue in the early 1960s as a way to secure computers, we couldn’t envision the many ways they’re being used today.
State governments are the guardians of valuable, sensitive data about their citizens, their employees and their operations. From tax and voter information to employee credentials and department files, all of that data is potentially at risk on many fronts.
Identity access and management (IAM), the IT security discipline dedicated to ensuring that the “right persons have access to the right resources at the right time for the right reasons,” has been around since the early 2000s. At that time, organizations and their IT teams were responding organically to the need for managing identity.
RFID technology aligns to this path of innovation. The use of RFID technology will never go away. We'll always need badges to authenticate experiences. But what will evolve is the way in which we use those badges. Bluetooth technology plays an integral role in this evolution.
There could be a security risk hiding in plain sight in your workplace. Consider this: Those hard-working printers scattered throughout your offices could actually be serving as easy entry points for security breaches.
October is National Cyber Security Awareness Month (NCSAM) in the U.S., and during the second week of the month, the focus is on higher education. Data breaches affect organizations across every vertical, yet many of these breaches could be avoided
Printing is a hidden cost that many organizations find hard to quantify. Beyond the price of physical materials such as equipment, paper and toner, there also are costs associated with maintenance, departments “doing their own thing” and even the opportunity cost of time spent waiting at the printer for a job to print.
Without authentication, there is no security. See how these common security protocols and simplification efforts are relevant to EVERY industry.
In the manufacturing world, it’s often hard to tangibly account for the benefits of RFID-enabled authentication. RFID operator authentication technology helps from the moment we enter the workplace to the moment we sign out, and everywhere in between. The benefits, although not often top-of-mind, expand beyond simplifying our daily tasks, into helping us be in compliance with industry regulations.
At ACDI, we're specialists in unbiased, consultative selling. Launched in 1994 as a hardware provider, we originally specialized in coin-op machines, among other hardware, for convenience printing. Sensing the shift in market demands, we made a switch to include software solutions in our product portfolio in 2011. Seven years later, software has become our largest revenue driver, and we're currently positioned as the largest PaperCut™ Authorized Solution Center (ASC) across the globe.
Like any industry, healthcare has a unique set of considerations, specifically when it comes to protecting its people – both patients and employees.
In the 10+ years since Windmill Computing became a distributor for RF IDeas, we've formed a long-standing relationship with the RFID community. We've learned a few tips on what it takes to be a successful reseller.
On May 25, 2018, the General Data Protection Regulation (GDPR) will go into effect. Residing in the U.K., I hear a lot about the upcoming deadline, and the implications it has on European Union (EU) citizens.
In our recent newsletter, we discussed how single sign-on, a type of identity access management (IAM), is a must-have security protocol for all organizations. Not only does the technology save organizations time, (some estimates put the savings at 25 hours per week when implementing an SSO solution) but it also increases security.
Mustering is a critical part of any disaster plan and involves accounting for personnel during an emergency. With the rise of RFID-based access control, many companies manage this process through the facility's access control system. In order for this process to be efficient and accurate, the data must be accessible from a mobile device. Sitting at a centralized workstation inside a building that is on fire will not work. During an evacuation, attendance is taken outside at muster points, far away from the building’s doorway and wired readers.
To help deploy a successful secure print solution, regardless of where you are in the adaptation process, we've come up with a list of helpful tips
Most people don't think about printing when they consider security breaches on the job. In fact, HP recently found that 56 percent of companies ignore printers in their endpoint security strategy. But with security breaches happening all over the office, both relating to physical and logical security, thinking of printer risks is a must-do for a complete security strategy.
Diving deeper into the first element, security assessment, can be a daunting task. What elements of my building should be considered? Did I forget a point of vulnerability? How can I possibly ensure ever element of my building is secure?
Implementing an extra layer of security in the office can send some heads spinning. Is this going to take me extra time? Will I have to remember a password?
Manufacturing is a behind-the-scenes operation that, while vital to all organizations, often gets little attention. When operations are running smoothly, everyone from the shareholders to the customers remain happy
The word security takes on many different definitions depending on the lens in which it is perceived. To an infant, security is the caring arms of a mother or father. A homeowner sees it as protection of their property. There's financial security and security in one's self. Perhaps the multitude of definitions can help explain why a simple Google search of the word security results in more than 1.8 billion results.
Security doesn’t just end at the door. It extends throughout the entire enterprise, including the organization’s print devices, whether multi- or single-function.