Read More >>
Knock, knock, who's there? Do you know who has access?
Written by: Sally Hudson
Are you really who you say you are? Strong authentication --- everyone talks about it, but where is it? When companies embark on a Cloud deployment, the lowest common denominator of "good enough" is almost always applied. Of course, "good enough" is usually determined by the criticality rating of the data and information to be accessed, coupled with the list of current and potential users. Unfortunately this often translates into a password, or if you're really lucky, a strong password and a picture to identify. And for some things maybe that is good enough, but most of us who are increasingly dependent on digital technology to pay our bills, order our goods, manage our finances and plan our trips, are beginning to realize that good enough might not be nearly enough.