Two-factor authentication (also known as 2FA) is an additional security layer for your business – helping to address the vulnerabilities of a standard password-only approach. It is a method of confirming users' claimed identities by using a combination of two different factors: 1) something they know, 2) something they have, or 3) something they are. … Continue reading All You Need to Know About 2-Factor Authentication
Over the last few years, data breaches have grown in both frequency and severity. According to Gemalto, data breaches compromised 4.5 billion records in only the first half of 2018. The most recent of these high-profile scandals is the Marriott data breach, where hackers stole private details from around 500 million customers. These details include … Continue reading Data and security breaches and how to stay safe online.
HARDWARE AUTHENTICATION The inadequacies of usernames and passwords are well known. Clearly, a more secure form of authentication is needed. One method is to bake authentication into a user's hardware. Intel is moving in that direction with the Authenticate solution in its new, sixth-generation Core vPro processor. It can combine a variety of hardware-enhanced factors … Continue reading 3 Innovations that Will Impact Cyber Security