We
all know that hackers are out there and the worst of the lot want the key to
our castle. In today’s world of online banking and VPN access to corporate
accounts, there are many who say we are still using the wrong type of ‘key;’
one that is easily stolen and/or copied.
The password is still around though, for better or worse (though Microsoft
is working on changing that soon, and with it comes the typical issues of
forgotten passwords and account lockouts.
With the average help desk call costing around $25-$30 per call, a
simple solution would be welcome in most environments. Instead of just your typical self-service
password reset solution; why not take a look at a password generator using
words that the user has previously set? If you are interested in reducing help
desk costs and empowering
your users, read on after the jump!
Showing posts with label authentication best practices. Show all posts
Showing posts with label authentication best practices. Show all posts
Friday, May 8, 2015
Wednesday, April 29, 2015
Authentication Best Practices - Brief History of Security
We talk a lot about the digital
age of warfare here at HackerAttacker.
It’s kind of the most popular aspect of the digital age today. Just take a look at history; war is always
resting at or about the pinnacle of the public forum. Why mess with a classic? When it comes to
security and authentication best practices, however, there are more avenues to
peruse than simply the digital side of warfare.
In that element, we are going to take a look at some older forms of
deception and how they play a role in the social relationships inherent in
digital security and authentication.
Subscribe to:
Posts (Atom)