Strengthening the Authentication of Your Users
They say a chain is only as strong as its weakest link. In the world of IT systems, you don’t want that weak link to be user authentication. Once a hacker gains access to a system as a valid (potentially high level) user, the amount of damage they can do is unlimited. There are different ways to validate a user’s identity and they have different levels of security. Using the three little pigs as an analogy, let’s take a look at the options:
1) The straw house – This is what we call single factor authentication. This just involves something you know or have. An example for physical security is a badge that is tapped on a door reader to gain access. If someone gets hold of the badge, that’s all they need to walk into the building. Another in the IT world is the familiar user ID and password. It’s what a majority of users use to gain access to their computer’s OS and applications. This has the potential to be fairly secure, but often times isn’t due to poor password choice. Users frequently pick passwords that are easy for them to remember which means they are easy for hackers to crack. Once they know the password they have total access to the system/application. Read more