Member-only story
Corporate Security Labyrinth: The Daily Digital Odyssey of Accessing Software
I spend 3 to 4 hours each working week only to have access to my company's software.
In the digital workplace, the process to start one’s day has become a journey itself — a journey through layers of security protocols, multiple authentication steps, and a myriad of platforms each with their own unique key.
The path to accessing our work systems has transformed into a labyrinthine process. Safeguarding sensitive information, also poses its own set of challenges and time considerations.
The Morning Ritual
I have 34 steps to start my workday.
Imagine starting your day, coffee in hand, ready to tackle the tasks ahead. The first barrier is the physical corporate computer login — a straightforward username and password combination that stands as the gatekeeper to your digital domain. But this is merely the outer gate of the fortress.
Computer Access
- Log on to corporate computer username / password.
- Open company phone with its passcode.
- Open 2fa authenticator from phone.
- Enter 2fa authenticator with its code.
- Enter 2fa generated code to login screen.
Secure Network (VPN) Access
6. Open corporate secure vpn.