Passwords today are problematic. They’re easily guessed, bypassed, stolen and, as far as securing things go, often bad at their job. Although it’s hard to beat the humble password when it comes to cheap, fast and convenient verification, it won’t always promise to be a secure solution. But have no fear. There are more secure, solid, and reliable solutions out there, and it’s time they get some spotlight. You’ve probably heard the terms “two-factor” or “biometric” authentication before (heck, I promote whenever I get the chance).
The CCNA exam is an entry-level IT certification from Cisco Systems for professionals installing and maintaining route and switched networks. The current exam.
Multi-factor authentication, too, is starting to take off in the workplace. With all of these terms floating around, it’s easy to confuse the different methods of authentication. So, let’s take a minute to break down the different forms of authentication, how they work, and how they can help to secure your information online. Single-factor authentication. Single factor authentication is the simplest: it’s just you matching one thing to verify yourself online.
![]()
The most popular example of this would be your password to your username. It’s the basis of the majority of digital verification today, and a method you likely use daily to log into online accounts. Two-factor authentication. Is a bit more complicated. In addition to your password/username combo, you’re asked to verify who you are with something that you – and only you — own, such as a mobile phone. Put simply: it uses two factors to confirm it’s you. There’s a good reason for this: today, getting access to something supposedly confidential isn’t that hard.
Many companies and consumer profiles are compromised because of simple, easy to guess passwords. By requiring a second form of identification,” to log in, hackers are limited in what they can pull off. Today’s most popular two-factor systems usually work by sending a unique code to the phone paired with your account. But there’s a problem with this approach: it’s not true two-factor authentication. It’s actually just the sharing of randomly generated knowledge between a company and a user, a process that assumes the user owns the device paired with the two-factor system. This system can be broken by intercepting that bit of shared knowledge — the unique code — between the two parties. Some hackers have managed to before they’ve reached their intended recipient.
Others have created duplicate, malicious copies of popular websites in an attempt to intercept credentials. But there’s good news: both methods of interception take a lot of work and expertise to pull off. For many of us, this common method of two-factor authentication is plenty safe. So what does “true” two-factor authentication look like? This involves giving users a unique device — one used internally, without Internet connection, such as a security token — that generates a unique code for the user to enter. That unique code, which usually changes at set intervals, is then matched with a profile on a database — making it very, very hard to guess.
Multi-factor authentication. In addition to the password/username combo, multi-factor authentication requires that users confirm a collection of things to verify their identity — usually something they have, and a factor unique to their physical being —think retina or fingerprint scan. Other forms of authentication can include location and the time of day. While multi-factor authentication seems like a sci-fi fantasy, it’s actually pretty common, particularly among banks. But this system is ready to go even further. Thanks to advances in camera technology, we’re now implementing a new secure method of recognition today: facial recognition.
If you want to learn more, check out how True Key™ by McAfee Log in using your face, fingerprint or a second device you own instead of typing passwords. So, what should you take away from this overview? Here are a few tips to keep you safe online: Use true two-factor and multi-factor authentication whenever you can. Both are solid, reliable methods of verification, so take advantage of them. Keep an eye out for biometric authentication. Day by day, biometric authentication is becoming more commonplace. Use of fingerprint readers, like Apple’s Touch ID, will see widespread adoption in the near future.
![]()
If you’re in the market for a new device, be sure to consider one with biometric authentication capabilities. Use a comprehensive security solution. Few things beat having a comprehensive security solution.
Both and include the True Key™ app, which allows you to log in to your devices, favorite sites, and apps using facial recognition and tributes unique to you. And of course, stay on top of the latest consumer and mobile security threats by and on Twitter, and Like us on. About the author: Gary Davis Gary Davis is Chief Consumer Security Evangelist. Through a consumer lens, he partners with internal teams to drive strategic alignment of products with the needs of the security space. Gary also provides security education to businesses and consumers by distilling complex security topics into actionable advice.
He is a sought-after speaker on trends in digital security including the evolving threat landscape, privacy and securing the Internet of Things. He has presented at high profile conferences and events including Consumer Electronics Show, Mobile World Congress, South by Southwest, and the National Association of Broadcasters. He has also delivered digital security topics to major educational institutions including Harvard University and Columbia University. Gary has appeared on multiple business, security and consumer lifestyle broadcast outlets, including CBS News, CNBC, NBC, ABC, FOX News, Bloomberg, WSJ MoneyBeat and quoted in the New York Times, the Wall Street Journal, USA Today, Money Magazine, CNN, Forbes, TIME Magazine and several more. During his 9+ years at McAfee, he has held leadership roles in the consumer and enterprise divisions where he has helped shape various product portfolios and strategic direction along with advocating for cybersecurity education. Prior to joining McAfee, he held senior management positions for more than 20 years in technology companies.
Gary served on the board of directors of the National Cyber Security Alliance (NCSA). For media requests, please contact [email protected] or [email protected].
Comments are closed.
|
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |