RF IDeas Blog

Stay connected with RF IDeas as we bring you the latest in the world of Identification and Authentication Access Solutions.

 

 

EPCS and 2FA: Authentication on the Frontlines of the Opioid Crisis

Authored by guest blogger Tim Goodwin, Vice President of Overseas Business and Operations | CERTIFY Global

 

Topic: Healthcare

IAM is now a Top 10 Strategic Priority for State Governments

As the National Association of State Chief Information Officers (NASCIO) celebrates their 50th year, they also released their annual list of...

Topic: Identity & Access Management

Advancing Identity Authentication

It is hard to believe that another year has passed and HIMSS19 has come to a close.  With over 43,000 attendees traversing the exhibit hall, the show was a...

Topic: Healthcare

No Single Badge to Rule Them All

Authored by guest blogger Lancelot Purdue | MyQ

 

User badge authentication should simplify lives and wallets – not...

Topic: Multi-Function Printers (MFP)

GOING MOBILE: How Mobile Credentials Can Improve Access Control in Healthcare

With more than 60% of the world’s population owning a mobile phone, business use of smartphones has become ubiquitous for the workforce around the world.

...
Topic: Healthcare

THE ROI OF SSO: How Single Sign-On Is Paying Off for Hospitals

With login processes continuing to be a complex and costly issue, more and more hospitals are implementing single sign-on (SSO) technology for the promise of...

Topic: Healthcare

Healthcare for hospital Keyboards — What’s lurking in the crevices of your hospital’s keyboards?

High-touch surfaces throughout healthcare environments are widely recognized as potential sources of infectious agents.

Topic: Healthcare

Drowning in Passwords? You're Not Alone. 5 Reasons Your Business Should Sign on to SSO

When passwords first came into vogue in the early 1960s as a way to secure computers, we couldn’t envision the many ways they’re being used today.

...
Topic: Authentication and Access

Identity Access Management and the State of CISOs: Where We Are Now

State governments are the guardians of valuable, sensitive data about their citizens, their employees and their operations. From tax and voter information to...

Topic: Government

The New IAM: 5 Challenges That Add New Risks

Identity access and management (IAM), the IT security discipline dedicated to ensuring that the “right persons have access to the right resources at the right...

Topic: Authentication and Access