Why password-only authentication is passe

Mobility, cloud, BYOD lead to surge in two-factor authentication schemes

By Bob Violino, Network World |  Security, BYOD, insider

The rapid growth of mobile devices that can access corporate networks and data, the expanding use of cloud-based IT services, and the increasing popularity of apps such as online banking mean that IT needs to pay closer attention to authentication.

Ensuring that users are who they claim to be can keep enterprises from experiencing damaging security breaches and the loss or theft of data.

For many companies, the multi-factor (or two-factor) approach to authentication -- the process of identifying an individual based on more than one factor such as a user name, password, smartcard or biometric attribute -- promises the best way to ensure someone's true identity.

To continue reading, register here to become an Insider. It's FREE to join.

Don't miss...

Best programming fonts
The 13 best programming fonts of all time
Top 10 programming skills that will get you hired
Top 10 programming skills that will get you hired
Low tech solutions to high tech problems
Funny fixes! 8 low-tech solutions for high-tech problems

  Sign me up for ITworld's FREE daily newsletter!
Email: 
 


Originally published on Network World |  Click here to read the original story.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Answers - Powered by ITworld

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Ask a Question