Page 77 - Cyber Defense eMagazine for July 2020
P. 77
Even though DHS recommends using two methods of verification, many other resources recommend
multi-factor authentication. This means that a computer (or mobile device) will only grant you access after
you present at least two pieces of “evidence” that only you would know or have access to.
“Evidence” includes information such as passwords and PIN numbers or physical characteristics such as
(fingerprint, voice recognition, etc.) The authentication could also be a physical item, such as a security
token.
Many organizations are also adopting Disaster Recovery-as-a-Service (DRaaS), which is “defined as
providing a remotely hosted disaster recovery service to protect a business’s data and applications,”
according to Carbonite.
With the sheer volume and variety of cyberattacks and warfare targeting individuals and organizations,
it’s more important than ever to take the appropriate precautions to ensure that personal information and
data remains secure and safe.
About the Author
Adnan Olia, Chief Operating Officer and Co-owner of Intradyn
Cyber Defense eMagazine –July 2020 Edition 77
Copyright © 2020, Cyber Defense Magazine. All rights reserved worldwide.