We've seen so many hacks today that focus on stealing user credentials and using them to pivot or escalate in a network. In this article I explain where two factor authentication should be used and alternate methods of technology that are available to implement this protection. Two factor isn't just for big business, either. It's for personal use too.
http://blog.algosec.com/2015/05/two-factor-authentication-why-when-and-how.html
http://blog.algosec.com/2015/05/two-factor-authentication-why-when-and-how.html
No comments:
Post a Comment