How Single Sign-on Works
SSO (single sign-on) is an authentication mechanism that allows users to login once using a single login account to access multiple applications or websites without re-entering the same login credentials. So for example, you login to your SSO application using your username and password, then all of your applications for work are available to access…
Read MoreShared Clinical Workstation Security and Access
Clinical computers are usually shared chaotically between clinicians and present unique vulnerabilities for IT teams in the healthcare ecosystem. The shared clinical workstation is used by physicians for nearly everything: login to EHR to look up patient charts, reporting, scheduling (i.e. surgery), order entry, medication, admission, and more. With so much going on in such…
Read MoreAutomatically Lock Computer When You Walk Away
Automatically lock computers when users walk away, both at the office and offsite. Lock unattended computers automatically when users step away using GateKeeper Proximity’s computer auto-lock feature. As long as the user’s token is present, the computer will remain logged in. The computer will automatically lock to ensure computer security policy as soon as the…
Read MoreSee Who is Logging in on Shared Windows Accounts
Need to accurately audit access logs across the network due to a shared computer? Not easy to track who is logging in when to which computer? Usually, admins can go to Event Viewer, Windows Logs > Security, then click on the event and you can see the username of the person that logged in for…
Read MoreHow to Automatically Launch Websites at Startup in Chrome
How to auto-launch websites on Chrome. Auto-launching applications saves lots of time. You can set your computer to open Chrome and launch any website you want at startup so you can skip having to manually click open everything such as your EHR, CRM, etc. Follow the steps below to save time by launching websites automatically…
Read MoreImproving Patient Care by Reducing IT Burdens on Physicians
The words condemning the inefficiencies and excessive administrative tasks of the current electronic health record (EHR) system came directly from the American College of Physicians (ACP). They called it “inefficient, excessive, and imposing”. The ACP said that EHR systems divert time from patient care and contribute to physician burnout. It was a wholesale condemnation of…
Read MoreWhat is Proximity Authentication?
Proximity authentication explained. Proximity authentication is the process of authenticating users of a system via their presence (proximity) using either a proximity token or smartphone. If the user is in a close enough proximity to the computer, then a prepared set of credentials are automatically verified and the user is authenticated. This is the fastest…
Read MorePreventing Password Fatigue & Stress
Stress alert! The biggest password problem might be the fatigue and stress. Password stress happens when users must memorize and type a large number of passwords on a consistent basis. Nobody wants to remember and type a long and complex password. The problem is that good security means unique usernames and passwords that are both long…
Read MoreBluetooth Proximity Lock for Workstations
Bluetooth proximity lock for computers allows you to lock and unlock computers with a Bluetooth signal (Bluetooth token or phone). Some Bluetooth PC lock models use active Bluetooth connections. Some are easier to use while others have more dynamic features for IT admins with a central admin console. Though this may require some setup or…
Read More