Data Breach

Multi Factor Authentication – Information Security Essentials

Multi Factor Authentication

Multi-Factor Authentication requires end users to provide multiple methods of identification to confirm their identity in order to gain access to corporate resources and applications, as well as perform online transactions. By requiring an additional factor beyond a simple password, multi-factor authentication technology makes it far more difficult to exploit the login process and wreak havoc by stealing corporate, customer or partner data.

The authentication factors that make up a multi-factor authentication request must come from two or more of the following (Claimant being authenticated may be a person, device, service, application or any other security principal that can be authenticated within the system):

 – Something a claimant knows (e.g., a personal identification number (PIN)/passphrase or response to a challenge question)

 – Something a claimant has (eg, physical token, smartcard or software-based certificate)

 – Something a claimant is (e.g., a fingerprint or iris scan)

Before investing in a multi-factor authentication solution, organisations need to take several things into account. A guide to criteria for evaluating and procuring multi-factor authentication products can be found here. That way, when it is time to select the right solution, the organisation will know what multi-factor authentication product features best match the use cases (e.g., Active Directory augmentation, strong identity verification and/or the strengthening of Web server logons) that apply to its environment and authentication needs.

CLICK HERE TO DOWNLOAD THIS SECMON1 INFORMATION SECURITY ESSENTIALS GUIDE

Christopher McNaughton

Recent Posts

Understanding the Australian economy through the lens of underwear and lipstick sales

In an intriguing development, recent trends in Australia's retail sector—namely, a decline in men's underwear…

1 year ago

New fraud costing Australian business millions annually

  If you work in the Finance Department of your company your email account might…

4 years ago

INFORMATION THEFT – THE EMPLOYEE RISK

  Information Theft - What is the Risk? Our research has shown that around 68%…

4 years ago

Don’t Become a Victim of Cyber Crime

  The Impacts of a Cyber Attack In your personal life and as an employee,…

4 years ago

YOUR COMPANY HAS BEEN BREACHED!

The Data Governance Watershed "You've been breached!" These are words none of us want to…

5 years ago

CASE STUDY – OFFICE 365 BREACH

CASE STUDY  (5 Min read)  The following case study details a case where SECMON1 was…

5 years ago