Posted on 12 June 2012 by Thales DIS
You may have seen the news recently about our healthcare project with Seattle Children’s, where we helped staff replace weak and static passwords with strong authentication contactless technology. Following on from this, I was delighted to come across Robert Keeler’s blog post on the news, entitled: “Has Healthcare EHR Turned the Corner? Yes!” It is […]
Posted on 27 April 2012 by Thales DIS
I imagine, like me, you probably carry your mobile phone with you all the time. I’ve never had mine stolen, but mobile phone theft is actually a really big problem globally, but especially in the United States. Did you know that in 2011, 42 percent of all property crimes of individuals in New York involved […]
Posted on 01 March 2012 by Kim Depussé
There’s been a lot of debate and discussion around Long Term Evolution (LTE), sometimes referred to as 4G technology. The move towards LTE is proving to be a key driver in the creation and launch of new services, particularly those being launched at this week’s Mobile World Congress. But what it is? In short, it’s […]
Posted on 28 November 2011 by Thales DIS
Pedro Martinez explains the challenges modern companies face in securing their data, particularly given the proliferation of the cloud. Pedro shows how on-site or hosted servers, which manage the authentication of tokens, help process a unique password for the user, authenticated by back-end systems. Smart, secure and easy solutions help customers and mean companies can […]
Posted on 08 November 2011 by Thales DIS
I read an interesting post by Chris Ripley on BlogCritics last week, looking at Google’s two-factor authentication. In case you missed its recent announcement, the search giant has made two-factor authentication available on its email accounts worldwide. This is a great step in the right direction and it’s fantastic to see people like Chris supporting the […]
Posted on 22 August 2011 by Thales DIS
In light of all the recent cyber attacks costing companies money, reputation and customer trust, stronger security and additional layers is increasingly becoming top of the shopping list for IT professionals. But there is still some confusion as to what are the best security elements that need to be in place to provide the best […]