Understanding two-factor authentication

There’s a lot to consider before you implement two-factor authentication, because it touches your enterprise infrastructure, applications and networks. The notion of using something whose only purpose is to help identify you to computing systems is older than the Web, but it’s gaining traction as the number of phishing and hacking exploits rises. 

In my story this week for Baseline magazine, I describe the various choices involved in two-factor authentication. 

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.