<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>User Authentication &#8211; ARCON</title>
	<atom:link href="https://arcon.xyz/category/user-authentication/feed/" rel="self" type="application/rss+xml" />
	<link>https://arcon.xyz</link>
	<description></description>
	<lastBuildDate>Fri, 10 Apr 2026 09:17:14 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
<image>
	<url>https://arcon.xyz/wp-content/uploads/2025/06/cropped-cropped-Placeholder-Image-1-removebg-preview-32x32.png</url>
	<title>User Authentication &#8211; ARCON</title>
	<link>https://arcon.xyz</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>IT Paradigm Shift, People and Challenges</title>
		<link>https://arcon.xyz/it-paradigm-shift-people-and-challenges/</link>
		
		<dc:creator><![CDATA[Int Team]]></dc:creator>
		<pubDate>Thu, 20 May 2021 06:35:10 +0000</pubDate>
				<category><![CDATA[User Behavior Analytics]]></category>
		<category><![CDATA[User Authentication]]></category>
		<guid isPermaLink="false">https://arconnet.com/?p=4818</guid>

					<description><![CDATA[Recap Do employees/end-users resist IT process changes? If yes, then why? Why changes (even if necessary) in internal IT processes are not readily accepted by employees/end-users? How can organizations address employee/end-user concerns? In two of our earlier blogs, we have discussed the reasons why people resist changes in the organization and how to overcome the [&#8230;]]]></description>
										<content:encoded><![CDATA[<h3><span style="color: #e6333a;"><b>Recap</b></span></h3>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Do employees/end-users resist IT process changes? If yes, then why?</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Why changes (even if necessary) in internal IT processes are not readily accepted by employees/end-users?</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">How can organizations address employee/end-user concerns?</span></li>
</ul>
<p><span style="font-weight: 400;">In two of our earlier blogs, we have discussed </span><span style="color: #e6333a;"><a style="color: #e6333a;" href="https://arconnet.com/blog/resistance-to-cultural-change-plays-spoilsport-to-strengthen-enterprise-it-security-part-1/" target="_blank" rel="noopener"><span style="font-weight: 400;">the reasons why people resist changes</span></a></span><span style="font-weight: 400;"> in the organization and </span><span style="color: #e6333a;"><a style="color: #e6333a;" href="https://arconnet.com/resistance-to-cultural-change-plays-spoilsport-to-strengthen-enterprise-it-security-part-2/" target="_blank" rel="noopener"><span style="font-weight: 400;">how to overcome the challenge of resistance</span></a></span><span style="font-weight: 400;">. In the last one year, there has been a sea change in the work culture of most of the organizations globally. Work-From-Home (WFH)  has been adopted by the majority of organizations due to the pandemic. </span></p>
<p><span style="font-weight: 400;">Nevertheless, the changing dynamics in the IT landscape have increased access control challenges. This, in turn, has altered the IT policies and procedures that could lead to friction among employees. </span></p>
<p><span style="font-weight: 400;">From a security and compliance perspective, reinforced access control is important, but for a frictionless IT environment a candid talk with the employees/ end-users is necessary. In this blog we discuss some major IT security trends and how the GRC managers can allay end-users’ concerns. </span></p>
<h3><span style="color: #e6333a;"><b>Treading a balance between people and IT policies </b></span></h3>
<p><span style="font-weight: 400;">While most of the organizations are adopting robust remote access control technologies to address the challenge arising from WFH (Work From Home), the employees’ concerns are often ignored. The employees’ interpretation about the changed work culture, eg. What they are thinking about the new IT practices and procedures, are they facing any discomfort &#8211; all these questions remain unattended. Needless to mention, both the employees and the organization need to address these before it&#8217;s too late. </span></p>
<p><span style="font-weight: 400;">Let’s discuss some of the IT practices that are important to IT security, but misconceptions among end-users could lead to ineffective implementation of the same. </span></p>
<ul>
<li aria-level="1"><b>Why Just-In-Time (JIT) Privilege?</b></li>
</ul>
<p>About 75% of data breach incidents start with abuse of privileges across the world. In order to manage, monitor and control privileged activities in remote work conditions, organizations count a lot on the <span style="color: #e6333a;"><a style="color: #e6333a;" href="https://arconnet.com/resources/whitepapers/just-in-time-privileges/" target="_blank" rel="noopener">JIT privilege principle</a></span> to avoid the risk of excessive standing privileges. Now, an end-user who had the liberty of all-time privilege might raise his/ her concern. <b>Explain that to implement the JIT principle is not about reducing their liberty but to adequately protect endpoints and critical infrastructure from unauthorized access. The JIT practice reduces the privileged account attack surface.</b><br />
<b></b></p>
<ul>
<li aria-level="1"><b>Why End-user Behaviour Monitoring?</b><span style="font-weight: 400;"> </span></li>
</ul>
<p>Many organizations are adopting predictive security mechanisms over preventive measures. Hence, continuous monitoring of the end-user behaviour is the best way to ensure improved vigilance. Implementing this security practice might throw a presumptive message to the employee that his/ her service is under observation and that they are being intruded on. <b>Explain that end-users’ monitoring is not about intruding into privacy but to ensure everyone works on a configured baseline IT policy. It eventually helps to increase the end-user productivity. </b><br />
<b></b></p>
<ul>
<li aria-level="1"><b>Why Rule &amp; Role-based Access Control?</b></li>
</ul>
<p>The rule and role-based access control mechanism is the only way to ensure restricted and authorized access to systems. In a vast and distributed IT environment, especially in a remote work environment, organizations face the challenge to manage and monitor multiple end-users. The employees, at this juncture, might nurture a feeling whether their employer is denying the access due to mistrust? <b>Explain that a role and rule-based access to systems enhances IT oversight and governance. This practice helps to implement the principle of least privilege for a robust compliance framework.</b><br />
<b></b></p>
<ul>
<li aria-level="1"><b>Why Too Much of Authentication?</b></li>
</ul>
<p><span style="font-weight: 400;">In today’s complex remote IT environment, it is important to find out whether or not the user activity is happening through a legitimate device. Multi-factor Authentication (MFA) along with Adaptive Authentication based on some anomaly-detection criteria like geo-location, IP address or typing speed of the users helps the administrators to find out the suspicious user and take immediate action on it. The end-user may say that logging activity is causing too much frustration. </span><b>Explain that in remote work environments, sophisticated cybercriminals can exploit the access control loopholes. MFA along with </b><span style="color: #e6333a;"><a style="color: #e6333a;" href="https://arconnet.com/resources/whitepapers/zero-trust-whitepaper/" target="_blank" rel="noopener"><b>adaptive authentication</b></a></span><b> is important to ensure network security.</b><span style="font-weight: 400;"> </span></p>
<h3></h3>
<h3><span style="color: #e6333a;"><b>Conclusion</b></span></h3>
<p><span style="font-weight: 400;">The employees can’t just be informed about the changes happening; the intimation of a change in policy/ technology should also include why these changes are happening and how the company would be benefited with this. This definitely reduces or alleviates the friction.</span></p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
