KeelHub | KeelWorks
Creating a Security Bulwark for 400+ employees against digital threats.
Role
Research, Product Strategy, UI/UX Design, Visual Design, Interaction Design
Timeline
Sept 2024 - Oct 2024

Challenge
400+ Nonprofit employees are at risk of cyberattacks due to inadequate user authentication and access management. I initiated an over haul of the designs aimed at removing the danger posed by the previous designs.
Outcome
My solution delivered:
80% decrease in user error rates
85% reduction in phishing incidents
90% drop in unauthorized access attempts
100% elimination of admin-related incidents
The Approach
Security-First Design
Grounded designs in real security logic, not just design thinking, ensuring both technical robustness and seamless user experience.
Cross-Team Alignment
Partnered with cybersecurity engineers throughout the design process and used visual communication to validate technical feasibility, catch issues early, and secure stakeholder buy-in.
Streamlined Security Experience
Redesigned authentication flows and implemented role-based access controls to minimize security risks around employee personal information.

Security-First Design
I conducted extensive research into secure authentication practices, diving deep into industry standards. This foundation ensured my proposed solutions would be both robust and feasible. Some serious limitations shaped what was possible though:
- Zero budget for SMS/email services
Users couldn't receive secure verification codes or links via paid services, they needed to manage their own verification methods.
- Global, varied user base
Designs had to be intuitive for users in different regions and tech skill levels.
- Stringent privacy requirements
Privacy regulations required careful handling of all sensitive user data.
- Compressed timeline with no user testing
Relied on dev insights, visual heuristics, and security standards without testing with users.
Solution | Criteria Score | Security | Cost | Accessibility | Privacy | Timeline | Key Comments |
---|---|---|---|---|---|---|---|
SMS Verification | 40% | High cost, not feasible globally without SMS service budget. | |||||
Email Verification | 52% | Better global support than SMS, but still costly due to service needs. | |||||
Authenticator Apps | 88% | Free, private, secure; ideal balance for global and budget constraints. | |||||
Hardware Keys | 52% | Most secure, but too new and not backwards-compatible for users without smartphones. |
Cross-Team Alignment
Worked closely with cybersecurity engineers from day one to make sure designs were both user-friendly and secure. Used mockups, diagrams, and prototypes to help everyone understand the technical requirements and get buy-in faster. Some key collabration strageries I used:
- Embedded Security Reviews
Integrated cybersecurity engineers into flow mapping and user journey sessions to identify vulnerabilities before designing.
- Visual Communication & Early Validation
Used mockups and diagrams to help stakeholders understand security requirements and demonstrate compliance upfront, accelerating approval and reducing costly late-stage revisions
Signup
I designed a login system that balanced security with ease of use. Google OAuth let users sign in instantly with their required Google Workspace emails. For added protection, I integrated two-factor authentication through authenticator apps, creating a solid defense against unauthorized access.


Streamlined Security Experience
Beyond improving security of the sign up and login, I introduced role-based access control to minimize exposure of sensitive employee data, ensuring users only see what they actually need for their job.
After researching permission systems and consulting with our security team, I proposed including a role-based access control (RBAC) system. This would provide robust protections for personal data while streamlining the admin experience.
Originally, designs included extensive customization capabilities, but stakeholder feedback revealed the need to prioritize speed-to-market, leading to a more streamlined, static approach that maintained core security benefits while reducing development complexity


I moved RBAC links into the navigation, rendered with conditional logic to ensure only authorized users can access them. If users tried to the pages directly through a URL, they would be redirected home
Here is What I learned
- #1
Start with Devs
Partnering with developers early taught me the importance of aligning technical feasibility with design goals, which strengthened both the designs and stakeholder buy-in. Through this collaboration, I deepened my understanding of cybersecurity principles and how they directly impact user safety.
- #2
Design for Change
Working on an MVP with ever-changing requirements taught me how to effectively prioritize features while aligning with stakeholder goals. I gained valuable experience in adapting to shifting needs by collaborating closely with cross-functional teams and refining my communication and decision-making skills.
- #3
Center the User, Even Without Them
Even without direct testing, I used informal SME interviews, past research, and universal design principles to keep user needs front and center.