Author's articles
Government Regulations Demand Higher Authentication Security
By Mitchel Smith · 12 years ago
As we start to settle into this new decade government regulations are demanding higher forms of authentication security for many industries. Many businesses in the financial, medical and educational industries are not using properly secured ...
Could A One Time Password Already Be Securing Your Industry?
By Mitchel Smith · 12 years ago
Technology affects every aspect of our life, especially our security. Luckily there is always new technology being created to help keep our lives more secure. As our lives become digitized it seems that more and ...
How Can an Out of Band One Time Password Secure Information
By Adam Quart · 12 years ago
Usually during the two-factor authentication process a one-time password is used to verify the user’s identity. This secures authentication by asking for multiple criteria to be met such as something you know and something you ...
Hackers, Mobile Technology and Social Media Sites and Multi Factor Authentication
By Adam Quart · 12 years ago
Many organizations are responding to the increased popularity of mobile devices and social media with increases in security staffing. Security professionals are most concerned about targeted attacks, external hackers and insider threats. Mobile computing, social ...
Tokenless Two Factor Authentication – More Secure and More Cost Effective than Using Tokens
By Mitchel Smith · 12 years ago
Are you or your organization re-evaluating its use of SecurID tokens following the RSA breach? After the March attack on RSA, where hackers stole information later used in an attack on U.S. defense contractor Lockheed ...
Phishing with the Man-in-the-Middle for Two-Factor Authentication
By Adam Quart · 12 years ago
What is a man in the middle attack (MITM)? Imagine this, an attacker puts up a fake bank website and entices users to that website. The user types in his or her password, and the ...
Two-Factor Authentication in our Daily Lives – Something You Have and Something You Know
By Mitchel Smith · 12 years ago
Most people never even realize they have used two-factor authentication almost every day of their lives. In actuality everyone has used the process for identifying themselves and continue to use it day in and day ...
What is Multi-Factor Authentication?
By Mitchel Smith · 13 years ago
Multi-Factor authentication, or sometimes called strong authentication, is an extension of two-factor authentication. Multi-factor authentication involves two or more factors whereas two factor authentication only involves exactly two factors. There are three basic "factors" in ...