In its 2022 Data Breach Investigations Report, Verizon reported that 82% of breaches involved the human element, and 18% of breaches involved internal actors. Considering that access control and identification are two of the four layers vital to physical security, it’s important to manage who can access your KeyTrak system.
To add and delete users, your system administrator should follow the steps below. (If you’re not sure how to designate a system administrator, read this post.)
Adding Users
When adding a new user, follow the principle of least privilege. In other words, a user should have the minimum level of access privileges required to do their jobs.
To add a new user to your KeyTrak system:
- Navigate to "Data Maintenance".
- Select "Users".
- Click "Add".
- Create a user ID and password. You may also add up to two fingerprints and/or a fob for user authentication. Some of the most secure combinations are fingerprint and password (most secure), fingerprint and fob, or fob and password.
Deleting Users
When an employee or contractor ends their employment with your organization, it’s critical that you revoke their access privileges immediately. If you don’t, employees could use their knowledge of your organization’s access control procedures to steal data, keys or money.
To remove a user from your KeyTrak system:
- Navigate to "Data Maintenance".
- Select "Users".
- Click "Delete".
- Click the trash icon.
- Click "Confirm".