(800) 567-1180

BUILDING INTEGRATION

Posts Tagged ‘Internet Security’

HID Authentication Services offers seamless identity and access control

Security goes far beyond regulating who can enter and exit your facility.

As the world grow increasingly complex and more and more of our interactions take place online, controlling access to cyberspace has become at least as important as controlling physical space. Consumers are more aware than ever of privacy concerns, and regulators are enacting rules aimed at protecting their digital lives.

Organizations, particularly those in heavily regulated industries like finance and healthcare, have struggled to keep up. In most cases, they have cobbled together a patchwork of access systems that determine who can go where in both physical facilities and online networks. Those systems are often not integrated, which makes maintenance far from seamless.

HID is hoping its new cloud-based authentication service will help organizations take a big step forward in building and maintaining fully integrated, seamless identity and access management systems.

HID Authentication Service offers multi-factor authentication for users across the entire organization, from users who require only minimal access to those who must have access to the most sensitive areas and records. HID Authentication Services integrates with existing platforms seamlessly using APIs. Reports are centrally gathered, making auditing for compliance issues much simpler.

“HID Global continues its move toward cloud solutions with the addition of new IAM services, expanding the offering with a unifying technology platform for our millions of users,” Brad arvis, vice president and managing director of Identity & Access Management Solutions (IAMS) with HID Global, said in a company press release.  “HID is among the only IAM solution providers that can offer authentication for high security use cases all the way down to basic enterprise multifactor authentication. With this breadth of solutions, we believe that organizations in regulated markets, in particular, will gain the most significant benefits from the HID Authentication Service.”

Interested in reviewing your access and authentication requirements? Call ECT Services for a consultation.

Four best practices for keep your business secure on social media

Americans spend more time on social media than any other major Internet activity, including email, according to Business Insider. Having a robust presence on social media is an absolute must for businesses and organizations. Here are four best practices aimed at protecting your business on social media:

Screen Shot 2015-11-29 at 6.59.26 PM

 

Keep an eye on who has access to your profiles. Grant only the level of access necessary based on responsibilities. Review profiles regularly – once a quarter – and revoke access where necessary. Change passwords regularly, and always after personnel changes. Failing to keep access permissions updated could give disgruntled former associates the opportunity to highjack your profile and wreak havoc on your image.

 

Be aware of copyright permissions. Don’t just Google for images to go along with a post; you are more than likely violating the copyright of whoever owns the image and opening yourself up to a lawsuit. Purchase rights from a stock photo service, or look for images available under creative commons licenses or in the public domain. Be sure to credit appropriately as indicated under the license.

 

Beware the overshare. Before you share in image captured inside your facility, review it from a security point of view. Does it reveal anything that might put customers or employees at risk? Look for exposed computer screens with sensitive data on display, research and development information that might tip off competitors, or anything that might compromise security. Before you post an announcement about a new employee, deal or partnership, be sure you’ve gained approval from all parties involved.

 

Be responsive. If a customer engages with your business online, be sure to respond in a timely, appropriate manner. Customers expect two-way communication on social media, and failing to respond can damage credibility. Responses should be handled by a team member trained in customer service, and with privacy and security in mind.