Page 77 - Cyber Defense eMagazine for July 2020
P. 77

Even though DHS recommends using two methods of verification, many other resources recommend
            multi-factor authentication. This means that a computer (or mobile device) will only grant you access after
            you present at least two pieces of “evidence” that only you would know or have access to.

            “Evidence” includes information such as passwords and PIN numbers or physical characteristics such as
            (fingerprint, voice recognition, etc.) The authentication could also be a physical item, such as a security
            token.

            Many organizations are also adopting Disaster Recovery-as-a-Service (DRaaS), which is “defined as
            providing a remotely hosted disaster recovery service to protect a business’s data and applications,”
            according to Carbonite.

            With the sheer volume and variety of cyberattacks and warfare targeting individuals and organizations,
            it’s more important than ever to take the appropriate precautions to ensure that personal information and
            data remains secure and safe.





            About the Author

                                     Adnan Olia, Chief Operating Officer and Co-owner of Intradyn





































            Cyber Defense eMagazine –July 2020 Edition                                                                                                                                                                                                                         77
            Copyright © 2020, Cyber Defense Magazine.  All rights reserved worldwide.
   72   73   74   75   76   77   78   79   80   81   82