(800) 233-0298
IDenticard Insights

What Are Shielded Badge Holders and How Do They Work?

Posted by Dan Ryan on Sep 11, 2017 10:00:00 AM

If you've been browsing our site looking for a new ID card holder, chances are you've encountered the term "shielded badge holder" at some point. And unless you're as familiar with ID products as we are, you probably had a very basic (but valid) question:

"What the heck is a shielded badge holder?"

A shielded badge holder sounds like it could be one of several things:

  • Did it get that name by being the favorite ID badge holder of medieval knights?
  • Is it just another name for a non-flexible badge holder?
  • Maybe it's a soft badge holder coated in an outer shell, like a turtle...

In reality, shielded badge holders are none of the above. Instead, shielded badge holders serve as a pretty basic solution to a very modern problem.

What is a shielded badge holder?

Read More

Topics: card accessories, modern security, data security, shielded badge holders, government ID cards, security tips, badge holders

A Modern Threat: The Importance of Data and Server Rack Security for Military Bases

Posted by Dan Ryan on Aug 4, 2017 1:00:00 PM

Today's military and intelligence units have a tough task at hand as they face a sobering reality: traditional methods of protecting a country and its citizens are no longer good enough.

Gone are the days where the latest weaponry and a strong army was all that was needed to keep peace at home and discourage conflict abroad.

The modern age requires those charged with protecting a country's people and interests to be prepared to fight both traditional and cutting-edge threats.

It's ironic, actually: the most visible forms of military security, like fighter jets and tanks, are borderline useless when it comes to protecting the country against one of today's biggest threats: cyberattacks and data theft.

As the world has become more connected through the Internet, smartphones and other forms of modern technology, cyber defenses have become increasingly important.

A half-century ago, "hacking" as a concept didn't really pose a tremendous threat; today, a powerful hacker could potentially take down a country's electric grid, disable air defenses or even force an unauthorized weapons launch, all with some malicious code and a few key strokes.

It's clear: protecting computer infrastructure and data has never been more important.

In this day and age, cybersecurity is national security

Read More

Topics: access control, Rack Armor, server security, data security, government access control, data center security

Data Protection & the Need for a Modern Server Rack Security Solution

Posted by Dan Ryan on Jun 30, 2017 12:00:00 PM

Nowadays, cybersecurity and data theft are two of the hottest topics in the world of technology.

The rise in the importance of and interest in cybersecurity has been driven by a number of high-profile incidents that have occurred over the past several years:

  • There have document and data dumps perpetrated by individuals like Edward Snowden and Reality Winner that have revealed sensitive government information.
  • There has been ongoing discussion about the involvement of Russia in "hacking" the United States Presidential Election.
  • There have been massive global malware attacks, like Petya and WannaCry, dedicated to stealing personal or customer data and holding it for ransom.

To put it simply, data security is a big deal in today's technology-focused world, and it's only going to get bigger.

Organizations around the world, terrified by the prospect of becoming the next company that has its customer data stolen and by having to deal with the ensuing PR fallout, have responded to these threats by ratcheting up their data protections.

These attempts have included things like two-factor authentication, biometric authentication and varying levels of encryption. 

While they're effective at addressing certain types of threats, these methods don't address a central vulnerability: your servers and data centers themselves.

Don't ignore the physical when you focus on the digital

Read More

Topics: access control, Rack Armor, data security, two-man rule, building security, hacking

3 Reasons You Need Server Rack Security

Posted by Dan Ryan on Nov 3, 2016 1:00:00 PM

Cyber security is of the utmost concern for organizations of all kinds.

From the Presidential debates to the front page of the local newspaper, you're seeing it everywhere: a data breach here, an email leak there, thousands of credit card numbers stolen, hundreds of identities compromised.

With the Internet playing such a huge role in global commerce, it's no wonder there's such an intense focus on keeping the data that powers that commerce engine safe from prying eyes and nefarious characters.

Organizations of all kinds spend millions of dollars securing networks, locking down accounts, fending off hackers and more, all in the name of keeping valuable data safe.

If your organization does any kind of business online, from e-commerce sales to email communication, chances are you're taking some steps to protect that data. 

However, there's an unsettling truth to all of these security measures: many organizations completely forget about securing the physical locations where this data is stored and processed.

We're talking, of course, about servers, the backbones of the Internet and keys to any web page visit, Facebook post, online transaction or Tweet.

Server rack security protects your customers, company and reputation

Read More

Topics: access control, Rack Armor, server security, modern security, data security

Watch How Easy It Is for Your RFID Card to be Cloned By Hackers [Video]

Posted by Dan Ryan on Jun 7, 2016 3:30:00 PM

It's a video that should give pause to any organization that uses radio-frequency identification (RFID) cards as employee badges.

TechInsider recently posted a video that the company shot with Redteam Security, an online security consulting group, that shows just how easy it is for hackers to not only copy the data on a smart card or a proximity card, but to also copy that data to a new card to create a fully functional clone.

If you're an employee whose company uses smart or prox cards for access, the video is a bit troubling. 

"Huh," you think. "Someone could get into our office like that. That's not good."

For security directors at government organizations, utility companies or organizations dealing in confidential matters, the video is chilling:

"That's how easy it is for someone to get access to our building, our computers and our data."

See the video that will keep security directors up at night

Read More

Topics: tech tips, proximity cards, smart cards, card security, data security, skimming, proximity accessories, RFID cards

Bring a Friend: The "Two-Man Rule" & What It Means for Data Center Security

Posted by Dan Ryan on Apr 28, 2016 8:30:00 AM

It's something everyone heard at some point as a child: "Use the Buddy System!"

Along with making parents feel better and keeping kids safer, the idea of the Buddy System also added a layer of accountability to any action: whatever was going on, there would be two people there to witness it.

In the field of information and data center security, there's a similar idea: the two-man rule.

The two-man rule adds accountability to any data center operation, adds security by preventing rogue individuals from doing any harm and lessens the dangers that can come from a lost access card or key.

In short, the same principle that guided the Buddy System that helped keep you safe as a child can help keep your data safe today. 

What is the two-man rule in data center security?

Read More

Topics: access control, Rack Armor, server security, modern security, data security, two-man rule, security tips

Subscribe to Email Updates

Posts by Topic

see all

Follow Me