True two-factor authentication: Explained

10th September 2014

Two-factor authentication (2FA) is one of the best ways to secure data and apps, but it must be applied properly for it to function completely. With more online applications appearing, there is obviously an increase in valuable data and with that, interested hackers are aplenty.

Recent breaches such as the iCloud and eBay debacles brought authentication to the forefront of business minds. Most hacking attempts are on username-and-password pairs, the choice of most online resources, security can become much more effective with 2FA.

READ MORE…

 

Find out more on how the public sector is using 2FA to deter hackers from valuable files and information at Government IT Security & Risk Management 2014. The event takes place at the Hotel Russell, London on September 24th and if you work in the public sector, you can join us as a delegate by getting in touch here.


Tags:
Blogs

BACK TO BLOGS