![]() ![]() Let's take two-factor authentication (2FA) as an example, as most people probably best understand this. But two additional factors can now be added in the shape of location (where you are) and behavior (what you do). It used to be the case that there were three generally accepted factor categories: knowledge (what you know), possession (what you have) and inherence (what you are). Multi-factor authentication (MFA) is, as the name suggests, the use of a mixture of different authentication methodologies from different categories. What is good practice, no matter what kind of organization you are, and applies equally to individuals, is to multi-factor authenticate all the things. ![]() Multi-factor authentication for all the things ![]() All three entries are stated to be "especially egregious" if done so with tech that's internet accessible. The other two, for your information, are not to use end-of-life or unsupported software and the avoidance of known, fixed or default passwords. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |