Member-only story

Corporate Security Labyrinth: The Daily Digital Odyssey of Accessing Software

Mark Kara
4 min readJan 30, 2024

I spend 3 to 4 hours each working week only to have access to my company's software.

In the digital workplace, the process to start one’s day has become a journey itself — a journey through layers of security protocols, multiple authentication steps, and a myriad of platforms each with their own unique key.

The path to accessing our work systems has transformed into a labyrinthine process. Safeguarding sensitive information, also poses its own set of challenges and time considerations.

The Morning Ritual

I have 34 steps to start my workday.

Imagine starting your day, coffee in hand, ready to tackle the tasks ahead. The first barrier is the physical corporate computer login — a straightforward username and password combination that stands as the gatekeeper to your digital domain. But this is merely the outer gate of the fortress.

Computer Access

  1. Log on to corporate computer username / password.
  2. Open company phone with its passcode.
  3. Open 2fa authenticator from phone.
  4. Enter 2fa authenticator with its code.
  5. Enter 2fa generated code to login screen.

Secure Network (VPN) Access

6. Open corporate secure vpn.

--

--

Mark Kara
Mark Kara

Written by Mark Kara

amazon.com/author/markkara Salesforce Marketing Cloud Technical Architect who writes on Technology, Data Science, Finance , Management and who creates Puzzles.

No responses yet