Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

September 2018 Issue

Now, More Than Ever, Your Organization Needs Strong Authentication


Multi-factor Authentication Tools Reduce Internal Threats and Help Save Patient Lives

By David Schwartz
Manager of Technical Development, Key Source International

Desktops around the globe remain vulnerable to internal at- versatile SSO software that responds to the needs of busi-
tacks and data breaches. Even companies vigilant in taking ness across all platforms, all sectors.
precautions to protect the desktop are exposed to financial
loss, fines, and bad publicity that diminishes their standing Peripheral manufacturers have reacted in kind with innova-
on the world stage. Whether through sabotage or criminal- tive products of their own. Working in tandem with leading
ity, a data breach has the power to send the largest of cor- SSOs, security peripherals achieve the highest possible level
porations to the smallest mom-and-pop into bankruptcy. of access control available today for business – the most so-
Recent implementation of the EU’s GDPR drives the point phisticated of which support multi-factor authentication
home further: It is in the best interest of all companies to along with other important features that protect the desk-
deploy the latest technological tools that stave off unau- top. Biometric fingerprint readers have become a leading
thorized access, avoid breaches of private data, and keep solution for foolproof end user authentication. When
their organizations ahead of the curve. paired with RFID badge reader technology, security is taken
to an even higher level, making it that much harder for po-
What are the internal threats companies face going into tential intruders to gain access. This dual authentication,
2019? Surprisingly, many of the same threats they’ve faced when combined with sonar presence technology, offers
since the advent of the personal computer. Viruses, tro- employers the trifecta of desktop security.
jans, lost and stolen passwords, and unauthorized access to
data, to name a few. Employers who have not established In preventing data breach, one of the more important, but
sound, forward-thinking desktop security policies and strat- sometimes forgotten, aspects of workstation security is
egies, that take into consideration logoff. A single unattended computer
every level of operations, are faced With so much at stake – money, can leave a company vulnerable to un-
with cleansing the aftermath of lost, authorized access, penetration of con-
shared, or stolen passwords. They’re time, consumer privacy, fidential information, and stolen intel-
faced with the headache of password organizational reputation – this is lectual property. Sonar presence
management. They’re left to deal technology detects the presence of a
with the aftershock of unauthorized
clearly no time for any entity to user upon approach to a locked desk-
data access. In the case of patient remain complacent about desktop top, prompts the user to enter secu-
care, they could very well be held re- security. rity information, i.e., username, pass-
sponsible for the improper dispensa- word, badge identification, or biomet-
tion of drugs that results in loss of life and the monetary rics – and triggers automatic and secure logoff when a user
damages that follow. physically moves away from the workstation.

Yet, amongst the bad, there is also good news. The large Keyboards manufactured by Key Source International inte-
number of products now available to IT professionals pre- grate each of these important features into one compact
sents a robust opportunity to hedge against data loss while desktop device. Much more than a superior input vessel, a
enabling seamless app navigation by employees. Today’s KSI keyboard integrates no less than four protective, mix-
Single Sign On (SSO) software offers employers the assur- and-match functions into one device, routed through a sin-
edness of foolproof multi-factor authentication along with gle USB port: fingerprint biometrics, RFID card reader tech-
an increased level of productivity. An employee is no nology, sonar walk-away presence detection, and a soft-
longer required to remember and laboriously enter pass- ware-driven keyboard cleaning system that controls infec-
words, or log in separately to each desktop program to tion at the clinical desktop on an enterprise-wide basis. An
maintain network security. A single, no-click sign-on is all amazing achievement for keeping pace with the ever-in-
it takes for secure access – saving time without sacrificing creasing demand for physical access control.
security. System administrators are in full control of set-
ting policy within the Windows Active Directory to block At $3.86 million, the average cost of a data breach has in-
access to unauthorized users, making data breach by lower creased 6.4 percent globally, according to a 2017 study
level employees much less likely. More and more hospitals conducted by IBM Security and Ponemon Institute. With
and pharmacies around the world are adhering to e-pre- so much at stake – money, time, consumer privacy, organi-
scribe standards that use SSOs to enroll credentials and zational reputation – this is clearly no time for any entity
identify providers, employing multi-factor authentication to remain complacent about desktop security. Ample
for the ultimate accountability. Pioneering companies like software and hardware tools are now at the disposal of
Crossmatch, Imprivata, CA Technologies, and Identity Au- every IT professional who seeks to safeguard the network
tomation have set the standard in creating today’s and realize an improved user experience.

Key Source International, located in California, manufactures security keyboards and


standalone pods, engineered for healthcare, banking, and government. For more
information, visit KSI Keyboards at www.ksikeyboards.com and www.sanakey.com.

You might also like