Guide to Evaluating Two-Factor Authentication Solutions

Passwords are a known weak link and continue to be exploited at alarming rates. From simple phishing schemes to sophisticated, targeted phishing attacks, gaining access to a user’s password is an easy and prolific attack. Regulatory agencies agree and are setting increasingly rigorous requirements for strongly authenticating users. Multi-factor authentication is no longer optional for many organizations.

Provided by: PhoneFactor Topic: Security Date Added: Jan 2011 Format: PDF

Find By Topic