PRO+ Premium Content/Information Security
Access your Pro+ Content below.
Strong authentication methods: Are you behind the curve?
This article is part of the Information Security issue of April 2017 Insider Edition
If users can't remember their passwords, consider it a positive sign. In 2015, football, baseball, and several Star Wars references made SplashData's top 25 worst list, alongside perennial favorites, 123456 and password. But beyond that, why are companies still having this discussion? Usernames and passwords, on their own, are a vulnerable form of authentication. Passwords are forgotten, written down, and unintentionally disclosed to phishers adept at crafting email lures. multifactor authentication (MFA) -- which requires verification from two or more independent credentials such as a password, security token or biometric identification -- may offer more layers of defense, but it is still not the norm. Why don't more enterprises adopt strong authentication methods? The answer may lie in uncertainty about the best technology options, implementation strategies and costs. Strategic considerations Start by understanding your use case. Is the user base small and focused on a small set of applications? A legal team within a large ...
Features in this issue
-
Identity and access management strategy: Time to modernize?
More likely than not, your company's identity and access management strategy needs an update. Learn how to decide if that's the case and, if so, what you should do now.
-
Strong authentication methods: Are you behind the curve?
Not sure who's really behind that username and password? Google, Facebook and others may finally give multifactor authentication technology the 'push' it needs.
Columns in this issue
-
Start redrawing your identity and access management roadmap
Securing enterprise systems and information requires an IAM roadmap that helps you identify effective policy, technology and tools.