2FA for the Administration of Critical Infrastructure Devices
Hojt Communication is a consulting company focused on our clients need to rapidly bring the right product to the right market. We stand out due to our ability to combine skills in strategy, implementation, operations and technology with deep understanding about the connected world and the new levels of security and privacy protection that world brings.
vision,strategy,product,market,business development,marketing,mobility,Internet of Things,IoT,Security
21954
post-template-default,single,single-post,postid-21954,single-format-standard,stockholm-core-2.4.5,select-child-theme-ver-1.0.0,select-theme-ver-9.12,ajax_fade,page_not_loaded,,qode_menu_,wpb-js-composer js-comp-ver-7.9,vc_responsive

2FA for the Administration of Critical Infrastructure Devices

af78fed7-1516-492d-b982-0bd394b89495.jpg

Supports for 2FA are increasing as service providers and banking institutions see the benefit in delivering a stronger authentication method to customers.

Sourced through Scoop.it from: www.tripwire.com

It’s the paranoid that survives.

And a paranoid CIO or IT administrator knows that there is no such thing as a private network anymore. You have to assume that you have been breached. In a worst case scenario, the bad guys have already acquired power user or administrator credentials.

You then have to start using the same tools that you try to enforce on your users; multi-factor authentication. If it’s not inconvenient for your users it’s certainly not too inconvenient for you that has access and the knowledge to understand the risks.

See on Scoop.itSecure communication