Two-Factor authentication News
January 17, 2017
Researchers saw a Gmail phishing campaign in the wild using clever tricks to access accounts including a difficult 2FA bypass only possible in real time.
December 16, 2016
News of a 2013 Yahoo breach will likely not be the jolt Americans need to become more cyber-savvy -- and that's scary. Also, Trump meets with tech leaders; FCC chair to resign.
November 22, 2016
Minutes count in legal work, and Graubard Miller needed a simpler platform for disaster recovery. The verdict: The law firm chose iland disaster recovery in the cloud.
September 01, 2016
Confirming that 68 million Dropbox passwords were exposed in 2012, the cloud provider continued to urge users to update their credentials and enable two-factor authentication.
Two-Factor authentication Get Started
Bring yourself up to speed with our introductory content
Two-factor authentication (2FA), often referred to as two-step verification, is a security process in which the user provides two authentication factors to verify they are who they say they are. Continue Reading
As mobile biometrics technology becomes increasingly common, it is important for IT to know how to support this kind of authentication and the security vulnerabilities it may still bring. Continue Reading
"They are who we thought they were." That’s what former Arizona Cardinals head coach Dennis Green shouted nonsensically at reporters during one of the most epic press conference meltdowns in ... Continue Reading
Evaluate Two-Factor authentication Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Now that NIST has deprecated the use of SMS 2FA, should nongovernment organizations follow suit? Expert Mike Chapple discusses the risks of SMS-based 2FA to enterprises. Continue Reading
Traditional passwords simply aren't good enough for VDI shops. Instead they need to make users' devices require a second form of authentication or use one-time passwords that change frequently. Continue Reading
Biometric security systems come with many advantages, but do they also come with many regulations? Expert Mike Chapple discusses biometric authentication compliance. Continue Reading
Manage Two-Factor authentication
Learn to apply best practices and optimize your operations.
Microsoft merged Windows Hello and Microsoft Passport to create Windows Hello for Business, which allows for two-factor authentication and enables single sign-on. Continue Reading
In this webcast, CISO Demetrios Lazarikos answers questions about IoT cybersecurity strategies and best practices. Continue Reading
The balance between user experience and security in VDI shops is not easy to find. Single sign-on, two-factor authentication and user experience monitoring can help. Continue Reading
Problem Solve Two-Factor authentication Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Two-factor authentication systems require more than using codes sent through SMS and smart cards. Expert Michael Cobb explains how to properly and effectively implement 2FA. Continue Reading
Attackers use compromised credentials to infiltrate enterprises undetected and steal corporate data. Expert Nick Lewis offers the best ways to handle this threat. Continue Reading
In this Q&A, the former CIO of Community Health Systems discusses how to prevent healthcare cyberattacks and lessons learned during his career. Continue Reading