Welcome to the rf IDEAS blog. Here, you’ll find our insights, trend information and guidance on a wide range of identification and authentication-related topics. Our authors are experts at rf IDEAS as well as partners and guests bloggers who bring their own perspectives. Browse, learn and enjoy.
Contactless attendance tracking software and authentication solutions are already playing a critical role in office environments, schools (related article here) and healthcare facilities. Recently, a major healthcare provider engaged rf IDEAS® and partner World Wide Technology (WWT) to implement a contact tracing solution across 800 locations serving thousands of employees… all in four weeks.
Our friends and partners at Imprivata recently completed a survey of healthcare executives, association members and CIOs to better understand how COVID-19 has directly affected their individual organizations’ Identity Management solutions. After reading through the results and analysis from the Imprivata team (related article found here), I would like to share what we at rf IDEAS have been doing to support Imprivata’s new efforts.
While 2020 will be remembered as the year we all worked from home, 2021 promises a return to productivity with workplaces reopening and authentication technologies shifting to meet new demands.
Take a quick peek at your to-do list. Chances are, changing or strengthening your password(s) is not at the top of the list. And while it’s understandable that we all have other priorities, the downside of weak or stolen passwords is the potential for damaging and costly data breaches.
The current pandemic has forced virtually every organization on the planet to transform their approaches to workplace productivity. As a vaccine starts to become a reality, many of the world’s leading companies are already focused on back-to-office strategies and long-term planning for safer on-site operations.
With the upcoming release of our WAVE ID® Bio reader, rf IDEAS now offers an all-in-one solution for multi-factor authentication that’s both super secure and super easy. It provides a biometric fingerprint reader, a Bluetooth® Low Energy mobile credential reader and a proximity/smart card reader in one sleek, modern, plug-and-play device that only consumes one USB port.
Event and attendance tracking plays an important role across educational settings. Students use identity cards and mobile credentials for classroom attendance, equipment check-out, accessing the library or school bus, meal plans and secure entry and access across campus facilities.
Time flies. It’s been two and a half years since I shared Three Insights for a Successful RFID Reseller with rf IDEAS for publication on their blog. Readership has been strong, and the relationship between rf IDEAS and Windmill Computing has continued to grow over the years, for which I’m grateful. But I’m often asked, “What has changed since then?”
In this interview, Wright explains how Imprivata and rf IDEAS collaborate on new authentication technologies to bring unsurpassed efficiency and security to busy healthcare environments.
As the logical access control pioneer and long-time leader, rf IDEAS is laser-focused on the opportunities for mobile access. Our WAVE ID® Mobile Readers work with today’s most widely used mobile credentials—including HID® Mobile Access, Orange Business Services Pack ID and Safetrust Wallet—while simultaneously supporting virtually every proximity and smartcard technology used worldwide.
Username and password schemes bring multiple risks, from weak and stolen passwords to shared keyboards that can spread pathogens. rf IDEAS has simple suggestions for avoiding these threats while enabling users to be more productive—at home and in the office.
As we all know, the long, national nightmare known as the opioid crisis continues to drag on across the U.S. According to a recent American Psychiatric Association poll, nearly one of three Americans knows someone addicted to some form of opioid. And, according to the CDC, on average, 130 Americans die every day from an opioid overdose.
When it comes to IAM, state governments are concerned about managing access for both their employees and the citizens they serve. According to Doug Robinson, NASCIO’s executive director, “enterprise IAM approaches and solutions are gaining more traction in the states and are essential for managing secure employee access and supporting digital government platforms for citizens.”
User badge authentication should simplify lives and wallets – not add an additional layer of complexity.
With more than 60% of the world’s population owning a mobile phone, business use of smartphones has become ubiquitous for the workforce around the world.
Healthcare workers’ hands often come into contact with blood, secretions, and many other substances in the course of a workday. These substances can be easily spread to the computer keyboard as clinicians input information, review doctor’s orders and navigate application screens. Moreover, keyboards are notoriously hard to clean because bacteria can become lodged beneath and between keys, and in areas that are hard to reach and disinfect.
When passwords first came into vogue in the early 1960s as a way to secure computers, we couldn’t envision the many ways they’re being used today.
State governments are the guardians of valuable, sensitive data about their citizens, their employees and their operations. From tax and voter information to employee credentials and department files, all of that data is potentially at risk on many fronts.
Identity access and management (IAM), the IT security discipline dedicated to ensuring that the “right persons have access to the right resources at the right time for the right reasons,” has been around since the early 2000s. At that time, organizations and their IT teams were responding organically to the need for managing identity.
RFID technology aligns to this path of innovation. The use of RFID technology will never go away. We'll always need badges to authenticate experiences. But what will evolve is the way in which we use those badges. Bluetooth technology plays an integral role in this evolution.
There could be a security risk hiding in plain sight in your workplace. Consider this: Those hard-working printers scattered throughout your offices could actually be serving as easy entry points for security breaches.
October is National Cyber Security Awareness Month (NCSAM) in the U.S., and during the second week of the month, the focus is on higher education. Data breaches affect organizations across every vertical, yet many of these breaches could be avoided
Printing is a hidden cost that many organizations find hard to quantify. Beyond the price of physical materials such as equipment, paper and toner, there also are costs associated with maintenance, departments “doing their own thing” and even the opportunity cost of time spent waiting at the printer for a job to print.
Without authentication, there is no security. See how these common security protocols and simplification efforts are relevant to EVERY industry.
In the manufacturing world, it’s often hard to tangibly account for the benefits of RFID-enabled authentication. RFID operator authentication technology helps from the moment we enter the workplace to the moment we sign out, and everywhere in between. The benefits, although not often top-of-mind, expand beyond simplifying our daily tasks, into helping us be in compliance with industry regulations.
At ACDI, we're specialists in unbiased, consultative selling. Launched in 1994 as a hardware provider, we originally specialized in coin-op machines, among other hardware, for convenience printing. Sensing the shift in market demands, we made a switch to include software solutions in our product portfolio in 2011. Seven years later, software has become our largest revenue driver, and we're currently positioned as the largest PaperCut™ Authorized Solution Center (ASC) across the globe.
Like any industry, healthcare has a unique set of considerations, specifically when it comes to protecting its people – both patients and employees.
In the 10+ years since Windmill Computing became a distributor for RF IDeas, we've formed a long-standing relationship with the RFID community. We've learned a few tips on what it takes to be a successful reseller.
On May 25, 2018, the General Data Protection Regulation (GDPR) will go into effect. Residing in the U.K., I hear a lot about the upcoming deadline, and the implications it has on European Union (EU) citizens.