Multi Factor Authentication adds another layer of defence that makes the difference between breaches and disaster avoidance.  Users may object to the introduced “complexity” but the value to their personal and professional lives must be understood.  Organisations should plan the implementation in a phased approach using a prioritised list of defended assets.  Whether using mobile apps, biometric, or established solutions such as fobs and smart cards, MFA has evolved from being an option to a necessity, especially in our cloud focused environments.  From critical payroll data to personal social media, you must consider using MFA against the present threat landscape.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s