Prevent Password Problems
Playing the password game isn’t hard – but winning at it is like playing chess with no way to checkmate the opponent. That’s going to cause a lot of password stress for both IT admins and end users at any organization. Learn how to checkmate password problems before they occur. Prevention is probably the best…
Read MoreSeamless MDT Login with Auto-Lock for Patrol Cars
Compliance requirements for law enforcement’s MDTs are getting stricter and requires a solution that meets the needs of both the user’s ease-of-use and the IT team’s need for stronger security. It’s ironic that accessing a car has gotten faster and easier while accessing a computer has only gotten more complex and time-consuming. MDTs generally require…
Read MoreHow Single Sign-on Works
SSO (single sign-on) is an authentication mechanism that allows users to login once using a single login account to access multiple applications or websites without re-entering the same login credentials. So for example, you login to your SSO application using your username and password, then all of your applications for work are available to access…
Read MoreShared Clinical Workstation Security and Access
Clinical computers are usually shared chaotically between clinicians and present unique vulnerabilities for IT teams in the healthcare ecosystem. The shared clinical workstation is used by physicians for nearly everything: login to EHR to look up patient charts, reporting, scheduling (i.e. surgery), order entry, medication, admission, and more. With so much going on in such…
Read MoreSee Who is Logging in on Shared Windows Accounts
Need to accurately audit access logs across the network due to a shared computer? Not easy to track who is logging in when to which computer? Usually, admins can go to Event Viewer, Windows Logs > Security, then click on the event and you can see the username of the person that logged in for…
Read MoreBenefits of Hardware Tokens for Authentication
IT administrators have many responsibilities that require elevated access to the systems that they are responsible for maintaining. This makes them attractive targets for attackers looking to penetrate the most sensitive systems that they control. It’s a well-known fact that many companies are still not taking appropriate measures to protect their privileged access. To complicate…
Read MoreWhat’s my computer’s domain name?
Look up your Computer’s Domain Name on Windows 10 PC. Windows 10: To find the Domain name for your Windows 10 PC, please follow the directions below. Click on the Start Menu. Go to Control Panel. Click System and Security. Click System. You’ll see your computer’s domain name at the bottom next to “Domain:“. In the example below, the…
Read MoreImproving Patient Care by Reducing IT Burdens on Physicians
The words condemning the inefficiencies and excessive administrative tasks of the current electronic health record (EHR) system came directly from the American College of Physicians (ACP). They called it “inefficient, excessive, and imposing”. The ACP said that EHR systems divert time from patient care and contribute to physician burnout. It was a wholesale condemnation of…
Read MoreWhat is Proximity Authentication?
Proximity authentication explained. Proximity authentication is the process of authenticating users of a system via their presence (proximity) using either a proximity token or smartphone. If the user is in a close enough proximity to the computer, then a prepared set of credentials are automatically verified and the user is authenticated. This is the fastest…
Read More