![]() Start your project by investigating which authentication devices can authenticate with the vendors you currently have as well as potential future vendors. NIST provides an overview of available authentication tokens. This makes it easier to consider adding a physical token key as the second authentication process to better protect your accounts. Many password-management programs do support FIDO, however. This is the most complex deployment, and many websites don’t support it. That makes FIDO and other physical key or token methods more phishing resistant and harder for attackers to bypass. ![]() FIDO includes specs that take advantage of biometric and other hardware-based security measures, either from specialized hardware security gadgets or the biometric features built into most new smartphones and some PCs. It does so by complementing or replacing them with strong authentication based on public-key cryptography. The FIDO (Fast Identity Online) standard is maintained by the FIDO Alliance and aims to reduce reliance on passwords for security. ![]() For organizations with high security requirements, that leaves hardware-based login options such as FIDO devices. ![]() Password management products are more secure, but they have vulnerabilities as shown by the recent LastPass breach that exposed an encrypted backup of a database of saved passwords. Storing passwords in the browser and sending one-time access codes by SMS or authenticator apps can be bypassed by phishing. Every business needs a secure way to collect, manage, and authenticate passwords. ![]()
0 Comments
Leave a Reply. |