2FA for the Administration of Critical Infrastructure Devices
Supports for 2FA are increasing as service providers and banking institutions see the benefit in delivering a stronger authentication method to customers.
Sourced through Scoop.it from: www.tripwire.com
It’s the paranoid that survives.
And a paranoid CIO or IT administrator knows that there is no such thing as a private network anymore. You have to assume that you have been breached. In a worst case scenario, the bad guys have already acquired power user or administrator credentials.
You then have to start using the same tools that you try to enforce on your users; multi-factor authentication. If it’s not inconvenient for your users it’s certainly not too inconvenient for you that has access and the knowledge to understand the risks.