Strong Authentication - Security Beyond Passwords

With security being as high a priority as ever, employers and systems alike are constantly urging employees to think a little harder about the password they use to secure their logins. The old conventions of using one’s favourite holiday destination or child’s name are now painfully dated and predictable, and many systems now demand the use of upper and lower case letters, numerals, and even symbols.

A Strong Authentication Alternative to Passwords

Users are also frequently required to keep track of multiple different passwords for the various systems they need to log in to, which compounds the problem and makes it incredibly tricky for users to keep track of all their passwords. This can, of course, lead to passwords being forgotten and having to be reset, or worse, being written down on pieces of paper and even the cardinal sin of having them stuck onto monitors on post-it notes!

While everyone - users and management alike - would appreciate the convenience of a single sign-in system covering several systems, their implementation is not always possible, especially if third party involvement is necessary.

Two-Factor Authentication: Ease of Use Without Sacrificing Security

There exist numerous secure login processes known as Strong Authentication, or Two-Factor Authentication, which use an external system to complete the login process, thereby eliminating the need for employees to create and remember complex passwords. Strong authentication removes the risk from logging in by combining two separate methods from the following list:

Something a person knows, e.g. a password, PIN, or security question
Something a person has, e.g. token or swipe card
Something specific to a person, e.g. a physical attribute

Strong Authentication Options from Shield IT Solutions

Shield IT Solutions have the experience and expertise to recommend an appropriate Two-Factor authentication system for your business, and work alongside you to fully implement it. We usually install strong authentication systems using Radius technology, employing temporary passwords which refresh once a minuteon either a either a physical token or software token. Certain systems provide single-use passwords via SMS message, which increases security by guaranteeing that the password will only reach the intended person.

Two-factor authentication solutions are ideal for securing systems and applications including:

Remote Access Solutions
Wireless Networks
E-mail systems
Websites
Microsoft Windows systems

For more information or to make an enquiry, please contact Shield IT Solutions today.

Cookie Policy