NEWS
Logical access security is a hot topic
Oakland, CA, May 6, 2015
Logical access security is how you logon to your computer network, traditionally with a user name and password.
It’s a hot topic for a few reasons:
- Vulnerability of passwords:
Most organizations still rely on passwords to secure access to data. And passwords are the single most commonly exploited security vulnerability.
- Network breaches:
Headline news regularly announce the latest network security breach, resulting in the exposure of valuable data, systems crashing, and often fines.
- Industry compliance requirements:
Many industry groups and government organizations now require that members demonstrate compliance to their published logical access security protocols, such as HIPAA, FIPS 140, CJIS.
- Market activity:
Many vendors are focusing on this vulnerability, raising awareness in a big way, but often offering solutions that are overkill for the problem that needs to be solved.
The simple solution for solving the logical access security hole is "two-factor authentication".
- One factor is what you have: a card or token.
- The second factor is what you know: your PIN.
Two-factor authentication has been recommended by Homeland Security and government directives for years, along with a password management program, as the way to solve logical access vulnerabilities.
Organizations that already use a building access card can add both two-factor authentication and password management simply by installing the Sphinx software.
For a more detailed description see: Remove Your Biggest IT Security Risk with Sphinx
All trademarks are property of their respective owners.
|