Two-Factor Authentication: Myths Versus Reality

By Chris Preimesberger  |  Posted 2013-05-03 Print this article Print
Two-Factor Authentication: Myths Versus Reality

Two-Factor Authentication: Myths Versus Reality

by Chris Preimesberger


Security is always among the highest priorities of any IT system. With the ever-increasing number of cyber-threats assaulting networks 24/7, IT security specialists are continually looking to defend all of their data surfaces. While IT has mostly been password driven for decades, enterprises are more frequently looking at deeper security layers to protect customer and internal business data. Two-factor authentication is now getting more trial runs as a result. This could include a combination of passwords and a secret answer to a question, entering a series of numbers or letters into a form, an SMS message or entering security tokens. While many two-factor authentication systems help prevent fraud, it is not a panacea for all threats. Several varieties of two-factor authentication (or 2FA as it's known) are available and in wide use today. Yet your network and your customers' data are still vulnerable. Before choosing a two-factor authentication system, research the different options available and have a clear understanding on what is being adopted by customers and what level of protection is provided. This eWEEK slide show examines truths and myths about two-factor authentication. Resources include Jim Fenton, chief security officer of OneID; IDC market research; and eWEEK reporting.


Submit a Comment

Loading Comments...
Manage your Newsletters: Login   Register My Newsletters

Rocket Fuel