Access your Pro+ Content below.
Strong authentication methods: Are you behind the curve?
This article is part of the Information Security magazine issue of April 2017 Insider Edition
If users can't remember their passwords, consider it a positive sign. In 2015, football, baseball, and several Star Wars references made SplashData's top 25 worst list, alongside perennial favorites, 123456 and password. But beyond that, why are companies still having this discussion? Usernames and passwords, on their own, are a vulnerable form of authentication. Passwords are forgotten, written down, and unintentionally disclosed to phishers adept at crafting email lures. Multifactor authentication (MFA) -- which requires verification from two or more independent credentials such as a password, security token or biometric identification -- may offer more layers of defense, but it is still not the norm. Why don't more enterprises adopt strong authentication methods? The answer may lie in uncertainty about the best technology options, implementation strategies and costs. Strategic considerations Start by understanding your use case. Is the user base small and focused on a small set of applications? A legal team within a large ...
Access this PRO+ Content for Free!
Features in this issue
More likely than not, your company's identity and access management strategy needs an update. Learn how to decide if that's the case and, if so, what you should do now.
Not sure who's really behind that username and password? Google, Facebook and others may finally give multifactor authentication technology the 'push' it needs.
Columns in this issue
Securing enterprise systems and information requires an IAM roadmap that helps you identify effective policy, technology and tools.