6 Steps to Protect Against a Data Breach
By
Joe Siegrist
Facebook
Facebook
Twitter
Twitter
LinkedIn
LinkedIn
Email
Email
0 Comments
Comments
1. Implement two-factor authentication systems where possible. Two-factor authentication puts another barrier between your data and a hacker. Using two-factor authentication requires that a person have both the login information (username and password) and additional proof — e.g., a generated code, fingerprint, confirmation of a security notification. Even if a password is compromised, another step is required before someone can gain access to a system. Dozens of web services and many internal systems are now built to support two-factor authentication, and it's critical to stopping the advancement of an attack.
0 Comments
View Comments
Joe Siegrist
Author's page
Related Content
Comments